Aiming at higher network security through extensive penetration tests

A Bechtsoudis, N Sklavos - IEEE latin america transactions, 2012 - ieeexplore.ieee.org
Modern enterprise infrastructures adopt multilayer network architectures and heterogeneous
server environments in order to efficiently fulfill each organization's goals and objectives …

[HTML][HTML] Mathematical model-based security management framework for future ICT outsourcing project

J Moon, C Lee, S Park, Y Kim, H Chang - Discrete Applied Mathematics, 2018 - Elsevier
The information communication technology (ICT) outsourcing market is growing larger every
year from the increasing number of companies that utilize ICT outsourcing, as industry scale …

A study of network security using penetration testing

R Shanmugapriya - 2013 International Conference on …, 2013 - ieeexplore.ieee.org
In the network security cybercrime technologies have brought many good things by means
of the internet: electronic commerce, easy access to vast stores of reference material …

Information Security Risk Management (ISRM) Model for Saudi Arabian Organisations

NMN Alshareef - 2022 - espace.curtin.edu.au
This research aimed to investigate the factors influencing information security risk
management (ISRM) and develop an ISRM model for large Saudi Arabian organisations …

Vulnerability Analysis and Risk Scoring of Networks

K Courtney, E Oleary, S Anand… - … on I-SMAC (IoT in Social …, 2023 - ieeexplore.ieee.org
The complexity of networks and many new vulnerabilities has become a big issue in the
cyber world in the last few years. This issue demands more strategies and techniques to …

[图书][B] The effects of risk and size of company on business performance in information technology outsourcing

SA Balogun - 2013 - search.proquest.com
Abstract Information technology (IT) outsourcing is a practical way to transfer information
technology by industries of different firms. The problem occurs when companies outsource …

Assessment of Information Security Risk Management System based on ISO/IEC27005 in the Independent High Electoral Commission: A Case Study

FRY Alazzawi - Rigeo, 2021 - rigeo.org
The current research aims to study the extent to which the Independent High Electoral
Commission applies to information security risk management by the international standard …

[PDF][PDF] Data Authentication Using Cryptography

S Chouksey, R Agrawal, D Verma, T Metta - International Journal of …, 2013 - Citeseer
We present a novel approach using cryptography for data authentication. The key idea is to
provide a encoded quantized data projection as authentication data. This can be correctly …

Managing the risks of outsourcing IT security in supply chain

T Tsiakis, P Tsiakis - … Management for Supply Chain Operations and …, 2013 - igi-global.com
Enterprises are expeditiously outsourcing the non-core business processes and functions.
This is happening in order for new efficiencies to be found and costs to be reduced along …

[图书][B] Identifying key determinants of service provider effectiveness and the impact it has on outsourced security success

JB Lewis - 2015 - search.proquest.com
The purpose of this research was to identify key determinants of service provider
effectiveness and how it impacts outsourced security success. As environments have …