An organization that works with any information must have a security system capable of protecting the information. However, the costs to be made to ensure a high level of security may not justify itself. The cost of securing a security system, the choice of the level of protection acceptable to the organization, is an important condition for putting the issue of Information Security. To solve this issue, it is necessary to conduct analytical experiments that will allow to assess the degree of protection of the resources of the organization. There are different methods and algorithms for assessing risks. Most of them differ in their probability and methods of assessing damage. The amount of risk analysis and management by experts has made th...
In the modern world there is a constant growth of information and information technologies, a risk-o...
Information is the primary asset for any organization. The security to the information should be giv...
In today’s business environment, almost all information is captured and stored in electronic form. T...
An organization that works with any information must have a security system capable of protecting th...
In the process of development of the security system of the information system, the risk assessment ...
The management system of informational security is a part of the management system of an organizatio...
This article presents the method of IT risk assessment from human behaviour perspective, developed b...
This article presents the method of IT risk assessment from human behaviour perspective, developed b...
Target of this study is to provide complete general view on security information management, which i...
One of the challenges of secure software construction (and maintenance) is to get control over the m...
Securing the organization critical information assets from sophisticated insider threats and outside...
AbstractInformation security is the most challenging aspect of information processing. Organizations...
Effective risk management is an important component of any successful security program. The main obj...
We live in the world in which the society is highly dependent on advanced diverse IT infrastructures...
Obtaining trustworthy estimates for the reliability and security of corporate information systems is...
In the modern world there is a constant growth of information and information technologies, a risk-o...
Information is the primary asset for any organization. The security to the information should be giv...
In today’s business environment, almost all information is captured and stored in electronic form. T...
An organization that works with any information must have a security system capable of protecting th...
In the process of development of the security system of the information system, the risk assessment ...
The management system of informational security is a part of the management system of an organizatio...
This article presents the method of IT risk assessment from human behaviour perspective, developed b...
This article presents the method of IT risk assessment from human behaviour perspective, developed b...
Target of this study is to provide complete general view on security information management, which i...
One of the challenges of secure software construction (and maintenance) is to get control over the m...
Securing the organization critical information assets from sophisticated insider threats and outside...
AbstractInformation security is the most challenging aspect of information processing. Organizations...
Effective risk management is an important component of any successful security program. The main obj...
We live in the world in which the society is highly dependent on advanced diverse IT infrastructures...
Obtaining trustworthy estimates for the reliability and security of corporate information systems is...
In the modern world there is a constant growth of information and information technologies, a risk-o...
Information is the primary asset for any organization. The security to the information should be giv...
In today’s business environment, almost all information is captured and stored in electronic form. T...