IP cameras and digital video recorders, as part of the Internet of Surveillance Things (IoST) technology, can sometimes allow unauthenticated access to the video feed or management …
This article addresses the issue of information security in the Industrial Internet of Things (IIoT) environment. Information security risk assessment in the IIoT is complicated by several …
The trend of API-based systems in web applications in the last few years keeps steadily growing. API allows web applications to interact with external systems to enable business-to …
The information society depends increasingly on risk assessment and management systems as means to adequately protect its key information assets. The availability of these systems …
S Yevseiev, O Milov, Y Pribyliev… - … -European Journal of …, 2023 - papers.ssrn.com
The development of technologies and computing resources not only expanded the spectrum of digital services in all areas of human activity, but also defined the spectrum of targeted …
Leading risk assessment standards such as the NIST SP 800-39 and ISO 27005 state that information security risk assessment (ISRA) is one of the crucial stages in the risk …
PD Ibnugraha, A Satria, FS Nagari, MF Rizal… - … : International Journal on …, 2023 - joiv.org
Today, academic institution involves digital data to support the educational process. It has advantages, especially related to ease of access and process. However, security problems …
BPA Prabhu, R Dani, C Bhatt - Automation and Computation, 2023 - taylorfrancis.com
This research was carried out with the intention of drawing attention to the vital role that cyber security plays in the hotel business. This research identifies and evaluates various …