Security remains a top priority for organizations as their information systems continue to be plagued by security breaches. This dissertation developed a unique approach to assess the security risks associated with information systems based on dynamic neural network architecture. The risks that are considered encompass the production computing environment and the client machine environment. The risks are established as metrics that define how susceptible each of the computing environments is to security breaches. The merit of the approach developed in this dissertation is based on the design and implementation of Artificial Neural Networks to assess the risks in the computing and client machine environments. The datasets that were utilized ...
Computer networks and surging advancements of innovative information technology construct a critical...
Cyberattacks have increased in number and severity, negatively impacting businesses and their servic...
In today’s business environment, almost all information is captured and stored in electronic form. T...
Security remains a top priority for organizations as their information systems continue to be plague...
Due to the abundance and fragmentation of information in the digital economy, the risk management sy...
Diverse forms of artificial intelligence (AI) are at the forefront of triggering digital security in...
The IT industry has boomed in the past few years with an ever increasing number of risk management a...
Effective assessment of cyber risks in the increasingly dynamic threat landscape must be supported b...
An information security audit method (ISA) for a distributed computer network (DCN) of an informatiz...
The extensive sharing of personal information over networks has given rise to an emerging malware in...
Information on the implementation of the architecture of the system of iterative dynamic risk assess...
Abstract The frequency of cyber attacks has been rising rapidly lately, which is a major concern. Be...
The advantage of fast computation capability of an artificial neural network (ANN) is used to introd...
Obtaining trustworthy estimates for the reliability and security of corporate information systems is...
Effective risk management is an important component of any successful security program. The main obj...
Computer networks and surging advancements of innovative information technology construct a critical...
Cyberattacks have increased in number and severity, negatively impacting businesses and their servic...
In today’s business environment, almost all information is captured and stored in electronic form. T...
Security remains a top priority for organizations as their information systems continue to be plague...
Due to the abundance and fragmentation of information in the digital economy, the risk management sy...
Diverse forms of artificial intelligence (AI) are at the forefront of triggering digital security in...
The IT industry has boomed in the past few years with an ever increasing number of risk management a...
Effective assessment of cyber risks in the increasingly dynamic threat landscape must be supported b...
An information security audit method (ISA) for a distributed computer network (DCN) of an informatiz...
The extensive sharing of personal information over networks has given rise to an emerging malware in...
Information on the implementation of the architecture of the system of iterative dynamic risk assess...
Abstract The frequency of cyber attacks has been rising rapidly lately, which is a major concern. Be...
The advantage of fast computation capability of an artificial neural network (ANN) is used to introd...
Obtaining trustworthy estimates for the reliability and security of corporate information systems is...
Effective risk management is an important component of any successful security program. The main obj...
Computer networks and surging advancements of innovative information technology construct a critical...
Cyberattacks have increased in number and severity, negatively impacting businesses and their servic...
In today’s business environment, almost all information is captured and stored in electronic form. T...