There are few legal requirements currently for information technology (IT) systems or infrastructure in Finland. Most, if not all, regulate information systems that are used in national security or in the public sector. This thesis does not attempt to regulate the private sector but attempts to create some recommendations for IT infrastructure for the security of supply industry. When a house is built, it must be built to code. When building IT systems, there is code involved, but rarely any legal requirements. Often at best, the client or subscriber has a contract or an agreement with the supplier which binds both parties. The author has done sysadmin work for years and understands the risks related to administrative resources. Argua...
The “weakest link” of security is the human and organizational aspects of information security. Nowa...
D.Phil.Any organisation is dependent on its information technology resources. The challenges posed b...
The aim of the study is to increase the effectiveness of information security management for state i...
This article deals with the deployment of a secure IT infrastructure on a company-wide basis. This m...
The main objective of this thesis is to study the infrastructural alteration of a company network. T...
Abstract—This paper presents possible path for securing public IT services. Public sector IT service...
Security is the foundation of any systems or organizations based on Information Technology(IT), e.g....
Every year, the Norwegian government and its organisations acquire a large number of new IT-systems....
Introduction Information technology security or computing system security is one of the most impor-t...
The objective of this thesis is to review the need for information system security, evaluate the tec...
The identification of the major information technology (IT) access control policies is required to d...
PhD thesis in Information technologyInformation and Communication Technologies (ICT) are permeating ...
This paper is a survey of recent activities of the legislative and executive branches of the U.S. Go...
This paper describes a highly original and new approach to securing data on workstations (desktops a...
In a time when networks are so readily interconnected around the world, computer security is a param...
The “weakest link” of security is the human and organizational aspects of information security. Nowa...
D.Phil.Any organisation is dependent on its information technology resources. The challenges posed b...
The aim of the study is to increase the effectiveness of information security management for state i...
This article deals with the deployment of a secure IT infrastructure on a company-wide basis. This m...
The main objective of this thesis is to study the infrastructural alteration of a company network. T...
Abstract—This paper presents possible path for securing public IT services. Public sector IT service...
Security is the foundation of any systems or organizations based on Information Technology(IT), e.g....
Every year, the Norwegian government and its organisations acquire a large number of new IT-systems....
Introduction Information technology security or computing system security is one of the most impor-t...
The objective of this thesis is to review the need for information system security, evaluate the tec...
The identification of the major information technology (IT) access control policies is required to d...
PhD thesis in Information technologyInformation and Communication Technologies (ICT) are permeating ...
This paper is a survey of recent activities of the legislative and executive branches of the U.S. Go...
This paper describes a highly original and new approach to securing data on workstations (desktops a...
In a time when networks are so readily interconnected around the world, computer security is a param...
The “weakest link” of security is the human and organizational aspects of information security. Nowa...
D.Phil.Any organisation is dependent on its information technology resources. The challenges posed b...
The aim of the study is to increase the effectiveness of information security management for state i...