Добірка наукової літератури з теми "Security threats"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Security threats".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Security threats"
Isokaitė-Valužė, Indrė. "International Peace and Security in Maritime Domain." Teisė 122 (March 30, 2022): 8–21. http://dx.doi.org/10.15388/teise.2022.122.1.
Повний текст джерелаPASTOR, Viliam. "CURRENT THREATS TO WORLD SECURITY." STRATEGIES XXI - Command and Staff College 17, no. 1 (August 11, 2021): 183–89. http://dx.doi.org/10.53477/2668-2028-21-22.
Повний текст джерелаJilani, Umair, Muhammad Umar Khan, Adnan Afroz, and Khawaja Masood Ahmed. "Wireless Security Threats." Sir Syed University Research Journal of Engineering & Technology 3, no. 1 (December 20, 2013): 6. http://dx.doi.org/10.33317/ssurj.v3i1.62.
Повний текст джерелаSaptono, Edy, Ribka Keiza, and Joni Wijayanto. "Security management of national park security in the border of Indonesia - Malaysia." Technium Social Sciences Journal 23 (September 9, 2021): 508–18. http://dx.doi.org/10.47577/tssj.v23i1.4371.
Повний текст джерелаSyomych, Mykola. "Management of organizational and legal security in the formation of competitiveness of agricultural business entities." Actual problems of innovative economy, no. 3 (May 30, 2019): 75–82. http://dx.doi.org/10.36887/2524-0455-2019-3-11.
Повний текст джерелаSyed, Farzana Zaheer, and Saba Javed. "Deterrence: A Security Strategy against Non Traditional Security Threats to Pakistan." International Journal of Social Sciences and Management 4, no. 4 (October 30, 2017): 267–74. http://dx.doi.org/10.3126/ijssm.v4i4.18503.
Повний текст джерелаPendergrass, John C., Karen Heart, C. Ranganathan, and V. N. Venkatakrishnan. "A Threat Table Based Assessment of Information Security in Telemedicine." International Journal of Healthcare Information Systems and Informatics 9, no. 4 (October 2014): 20–31. http://dx.doi.org/10.4018/ijhisi.2014100102.
Повний текст джерелаKarpavičiūtė, Ieva. "Securitization and Lithuania’s National Security Change." Lithuanian Foreign Policy Review 36, no. 1 (December 20, 2017): 9–33. http://dx.doi.org/10.1515/lfpr-2017-0005.
Повний текст джерелаHojda, Mihaela Hortensia. "Information security economics: cyber security threats." Proceedings of the International Conference on Business Excellence 16, no. 1 (August 1, 2022): 584–92. http://dx.doi.org/10.2478/picbe-2022-0056.
Повний текст джерелаصادق, بارزان. "Internal Security Threats on the Kurdistan Region – Iraq." Journal for Political and Security Studies 3, no. 6 (December 1, 2020): 84–130. http://dx.doi.org/10.31271/jopss.10040.
Повний текст джерелаДисертації з теми "Security threats"
Olandersson, Sandra, and Jeanette Fredsson. "Threats in Information Security : Beyond technical solutions. - Using Threat Tree Analysis." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3829.
Повний текст джерелаFör att kunna skydda en organisations resurser är det viktigt att förstå vad organisationen behöver skydda och vad den ska skydda det ifrån. Det första steget är att analysera hot mot organisationens resurser för att uppskatta riskerna. Hot måste identifieras för att organisationen ska kunna skydda sina resurser och hitta den optimala placeringen av åtgärder mot hot. Denna uppsatsen undersöker om det är möjligt att skapa en hotträdsanalys som är användbar för skapandet av en informationssäkerhetspolicy för Ronneby kommun, genom att använda standarden SS 62 77 99-1. Vi betonar i uppsatsen att ett samarbete mellan existerande tekniska lösningar och administrativ säkerhet är nödvändigt för att uppnå informationssäkerhet. Visst kan var och en av dessa hjälpa till att förbättra säkerheten, men ingen av dem är ensam den kompletta lösningen. Säkerhet är inte en produkt - det är en process. Hotträd formar grunden för en förståelse av den processen. I denna uppsats har vi använt en kvalitativ metod. Analysmetoden är en fallstudie på Socialförvaltningen i Ronneby kommun. Genom intervjuer har vi fått fram att organisationen inte har etablerat en informationssäkerhetspolicy, vilken ska ge riktlinjer för hur säkerhetsarbetet ska fullföljas inom organisationen. Organisationen använder varken en modell för att identifiera hot mot information eller en metod för att strukturera hoten. Genom strukturen av möjliga hot, genererar personalen en förståelse för organisationen och tar aktivt del i att identifiera hot mot Socialförvaltningen. Detta medför att alla användare förstår hur viktigt det är med säkerhet, vart de ska rapportera misstänkta händelser och de kan göra mycket för att minska risken att förlora information. Det är viktigt att komma ihåg att utbildning är en pågående process, nya användare behöver utbildning och utbildade användare behöver vidareutbildning, speciellt när nya tekniker eller processer introduceras. Därför är hotträdsanalysen en användbar modell för arbetet mot att skapa en informationssäkerhetspolicy enligt standarden SS 62 77 99-1.
Sandra Olandersson Blåbärsvägen 27 372 38 RONNEBY 0457 / 12084 Jeanette Fredsson Villa Viola 372 36 RONNEBY 0457 / 26616
Mahmood, Faisal. "SIP Security Threats and Countermeasures." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-18126.
Повний текст джерелаSafdar, Naveed. "Internal security threats to Pakistan." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Dec%5FSafdar.pdf.
Повний текст джерелаThesis advisor(s): Robert E. Looney, Feroz Hassan Khan. Includes bibliographical references. Also available online.
Xu, Zhang. "Understanding Security Threats in Cloud." W&M ScholarWorks, 2016. https://scholarworks.wm.edu/etd/1477067957.
Повний текст джерелаCramer, Jane Kellett 1964. "National security panics : overestimating threats to national security." Thesis, Massachusetts Institute of Technology, 2002. http://hdl.handle.net/1721.1/8312.
Повний текст джерелаIncludes bibliographical references (p. 415-427).
Three times in this century the US public has panicked with fear because of exaggerations of external threats to the nation. These panics peaked in 1950,1960, and 1980. Why did the U.S. markedly exaggerate the Soviet threat at these times? These periods of widespread public fear were "defining moments" when the US created confrontational and militarized containment policies. These panics ratcheted up the arms race tremendously between the US and the Soviet Union, and arguably these panics led to unnecessary confrontations and crises. In this study I test leading explanations of these cases--eight hypotheses drawn from three different perspectives. The Rational Perspective argues insufficient information and uncertainty about present and future capabilities and intentions causes overestimations. The Psychological Perspective argues cognitive errors could cause these overestimations (attribution theory and schema theory/analogical reasoning, tested here). The Domestic Politics Perspective argues oversell, logrolling, electoral politics and/or militarism causes public overestimations. Domestic Politics best explains the national misperceptions examined. In each case, the sources of the specific misperceptions examined were clearly rooted in domestic politics (1950: oversell and militarism; 1960 and 1980: electoral politics and militarism.) Uncertainty about the threat was found to be a significant contributing factor in 1950 (but not the source/elites did not unintentionally overestimate when the misperceptions first formed).
(cont.) Uncertainty was found to be a significant "permissive condition" for the misperceptions of 1960-but uncertainty was highest just after Sputnik in 1957, and sharply decreased by 1960, yet public fear increased and peaked in 1960. There was no significant uncertainty in the 1980 panic--uncertainty is not a necessary condition for panic. Psychological hypotheses were not detected playing a role in causing these panics. Leaders private deliberations were examined and did not exhibit the patterns of reasoning predicted by these theories (e.g. leaders were aware of provoking the threat). National misperceptions guide policy and shape many leaders' beliefs through "blowback" and psychological post hoc rationaliztion. These large, important misperceptions are rooted in domestic politics, while international relations scholars focus on psychological and rational reasons for misperceptions. The study of misperceptions in international relations needs to be re-oriented.
by Jane Kellett Cramer.
Ph.D.
Wullenweber, Emily Rose Stephens John D. "Biofuels the security threats of a security solution /." Chapel Hill, N.C. : University of North Carolina at Chapel Hill, 2008. http://dc.lib.unc.edu/u?/etd,2123.
Повний текст джерелаTitle from electronic title page (viewed Feb. 17, 2009). "... in partial fulfillment of the requirements for the degree of Master of Arts in the Department of Political Science, Concentration TransAtlantic Studies." Discipline: Political Science; Department/School: Political Science.
Byman, G. (Gabriel). "Connected devices:security threats vs. implemented security." Bachelor's thesis, University of Oulu, 2017. http://urn.fi/URN:NBN:fi:oulu-201704111464.
Повний текст джерелаTämän opinnäytetyön tavoitteena oli selvittää verkottuneiden laitteiden turvallisuusuhkia ja verrata niitä saatavilla oleviin turvallisuusratkaisuihin. Olemassa olevista kytketyistä laitteista valittiin tarkasteluun yhden valmistajan aktiivisuusmittari, jonka turvallisuusratkaisut tutkittiin ja analysoitiin. Verkottuneet laitteet luokiteltiin vaikuttavan tekijän mukaan, jotta saatiin laajempi näkemys laitteista. Verkottuneiden laitteiden luokittelu jaoteltiin turvallisuusuhkien ja -ratkaisujen näkökulmasta kuluttajien, yritysten ja valtion markkinasektoreihin. Keskeinen tekijä valitun laitteen tietoturvaratkaisuun on laitteen myyntihinta. Tietoturvallisuuden ja tietoturvauhkien määrittelymetodit muodostavat perustan, josta turvallisuusuhkat voidaan määritellä. Tietoturvauhkia voitiin määritellä käyttämällä tietoturvan periaatteita ja uhkien tunnistamisen menetelmiä. Valitusta laitteesta tutkitaan tietoturvaperiaatteet luottamuksellisuuden, todennuksen, eheyden, saatavuuden ja kiistämättömyyden osalta. Uhan tunnistaminen otetaan käyttöön säännöllisessä STRIDEssa (Spoofing = väärentäminen, Tampering = manipulointi, Repudiation = torjuminen, Information Disclosure = tiedon julkistaminen, Denial of Service = palvelun esto ja Elevation of Privilege = käyttöoikeuksien luvaton laajentaminen). Tietoturvaratkaisujen johdanto alkaa luokittelemalla verkottuneiden laitteiden ekosysteemit kattavasti turvallisuuteen liittyviin tekijöihin. Turvallisuuden mahdollistavat suojattu käynnistys, tunnistaminen, todentaminen, suojatut yhteydet, tietoturva, tunkeutumisen esto, turvallisuuden seuranta, turvallisuuspäivitykset sekä suojattu laitteisto. Tutkimus käsittelee aktiivisuusmittarin ja sen ekosysteemin merkityksellisiä tietoturvauhkia. Valitut turvallisuusominaisuudet aktiivisuusmittarin ja älypuhelimen välisestä bluetooth-yhteydestä testattiin. Tulokset osoittavat, että käytetty turvallisuusratkaisu ei usein pysty käsittelemään kaikkia turvallisuusuhkia. Kuitenkin verkottuneiden laitteiden valmistajat voivat tasapainoilla mahdollisten uhkiin liittyvien riskien ja käytetyn turvallisuusratkaisun kustannusten välillä suhteuttamalla uhkan riskit ja vaikutukset
Biswas, Kamanashis, and Md Liakat Ali. "Security Threats in Mobile Ad Hoc Network." Thesis, Blekinge Tekniska Högskola, Avdelningen för för interaktion och systemdesign, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5926.
Повний текст джерелаZakharov, I. "Threats to information security of the enterprise." Thesis, Видавництво СумДУ, 2009. http://essuir.sumdu.edu.ua/handle/123456789/7954.
Повний текст джерелаGong, Xuwei. "Security Threats and Countermeasures for Connected Vehicles." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-259494.
Повний текст джерелаMed den snabba utvecklingen av anslutna fordon har bilsäkerhet blivit ett av de viktigaste ämnena. För att studera hur man skyddar säkerheten för fordonskommunikation analyserar vi potentiella hot mot anslutna fordon och diskuterar motåtgärder för att mildra dessa hot. I denna avhandling undersöker vi 25 tjänster som anslutna fordon kan tillhandahålla. Entiteter, anslutningar och meddelandeflöden i dessa tjänster undersöks och syntetiseras i en fordonsnätverksstruktur. De 25 tjänsterna är indelade i sex användarvägar, inklusive: infotainment service, fjärrövervakning, enhetskontroll, Fordon-tillallt (V2X), diagnostikservice och IDS-system (Intrusion Detection System). Vi etablerar kommunikationsmodeller för dessa användningsfall och analyserar de potentiella hot som baseras på CIA-kriterier (Confidentiality, Integrity and Availability). Vi diskuterar eventuella motåtgärder som kan mildra dessa hot baserat på befintliga nätverkssäkerhetstekniker. Varje alternativ motåtgärds fördelar och begränsningar presenteras. För att filtrera eventuella attacker undersöker vi och utformar brandväggar i fyra delar av ett fordon: Dedicated Short-Range Communications (DSRC) -modul, gateway, Telematic Control Unit (TCU) och Human Machine Interface (HMI). Vi simulerar också en brandvägg för en HMI-applikation genom att bygga en kommunikationsmodell i Python.
Книги з теми "Security threats"
1953-, Aldis Anne, and Herd Graeme P, eds. Soft security threats and European security. London: Routledge, 2005.
Знайти повний текст джерелаBhaskar, Krish. Computer security: Threats and countermeasures. Manchester: NCC Blackwell, 1993.
Знайти повний текст джерелаThreats to U.S. national security. Washington: U.S. G.P.O., 1997.
Знайти повний текст джерелаOffice, New Zealand Audit. Managing threats to domestic security. Wellington [N.Z.]: Audit Office, 2003.
Знайти повний текст джерелаA, Campbell Andrew, ed. Water security: Conflicts, threats, policies. Denver, CO: DTP Publishing, 2011.
Знайти повний текст джерелаInsider threats in cyber security. New York: Springer, 2010.
Знайти повний текст джерелаComputer security: Threats and countermeasures. Manchester: NCC Blackwell, 1993.
Знайти повний текст джерелаBarnett, Dana, and Efraim Karsh. Soft Threats to National Security. London: Routledge, 2021. http://dx.doi.org/10.4324/9781003243151.
Повний текст джерелаProbst, Christian W., Jeffrey Hunker, Dieter Gollmann, and Matt Bishop, eds. Insider Threats in Cyber Security. Boston, MA: Springer US, 2010. http://dx.doi.org/10.1007/978-1-4419-7133-3.
Повний текст джерелаJones, J. Anthony A., Trahel G. Vardanian, and Christina Hakopian, eds. Threats to Global Water Security. Dordrecht: Springer Netherlands, 2009. http://dx.doi.org/10.1007/978-90-481-2344-5.
Повний текст джерелаЧастини книг з теми "Security threats"
DeFranco, Joanna F., and Bob Maley. "Security Threats." In What Every Engineer Should Know About Cyber Security and Digital Forensics, 1–13. 2nd ed. Boca Raton: CRC Press, 2022. http://dx.doi.org/10.1201/9781003245223-1.
Повний текст джерелаLal, Rollie. "Economic Threats." In Security Studies, 502–18. 4th ed. London: Routledge, 2023. http://dx.doi.org/10.4324/9781003247821-35.
Повний текст джерелаKhan, Suhel Ahmad, Rajeev Kumar, and Raees Ahmad Khan. "Threats to Security." In Software Security, 49–72. Boca Raton: Chapman and Hall/CRC, 2022. http://dx.doi.org/10.1201/9781003330516-3.
Повний текст джерелаKaunert, Christian, and Ori Wertman. "Reconceptualizing Security Threats." In Handbook of Security Science, 261–73. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-319-91875-4_41.
Повний текст джерелаKurze, Arnaud, and Christopher K. Lamont. "Global Security Threats." In Mapping Global Justice, 215–28. London: Routledge, 2022. http://dx.doi.org/10.4324/9781003143819-15.
Повний текст джерелаKaunert, Christian, and Ori Wertman. "Reconceptualizing Security Threats." In Handbook of Security Science, 1–14. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-319-51761-2_41-1.
Повний текст джерелаRenwick, Neil. "Pandemic Threats." In Northeast Asian Critical Security, 108–41. London: Palgrave Macmillan UK, 2004. http://dx.doi.org/10.1057/9780230287181_4.
Повний текст джерелаDean, Drew. "Web security: A high level view." In Network Threats, 55–57. Providence, Rhode Island: American Mathematical Society, 1997. http://dx.doi.org/10.1090/dimacs/038/06.
Повний текст джерелаMorgan, Patrick M. "Security Issues: Old Threats, New Threats, No Threats." In Asia’s New World Order, 76–109. London: Palgrave Macmillan UK, 1997. http://dx.doi.org/10.1007/978-1-349-14137-1_4.
Повний текст джерелаWallach, Dan, Jim Roskind, and Edward Felten. "Flexible, extensible Java security using digital signature." In Network Threats, 59–74. Providence, Rhode Island: American Mathematical Society, 1997. http://dx.doi.org/10.1090/dimacs/038/07.
Повний текст джерелаТези доповідей конференцій з теми "Security threats"
Alfaw, Aysha H., and Alauddin Al-Omary. "5G Security Threats." In 2022 International Conference on Data Analytics for Business and Industry (ICDABI). IEEE, 2022. http://dx.doi.org/10.1109/icdabi56818.2022.10041502.
Повний текст джерелаShrivas, Mahendra Kumar, Thomas Yeboah Dean, and S. Selva Brunda. "The Disruptive Blockchain Security Threats and Threat Categorization." In 2020 First International Conference on Power, Control and Computing Technologies (ICPC2T). IEEE, 2020. http://dx.doi.org/10.1109/icpc2t48082.2020.9071475.
Повний текст джерелаJames, I. "Modelling ultraviolet threats." In SPIE Security + Defence, edited by David H. Titterton, Robert J. Grasso, and Mark A. Richardson. SPIE, 2016. http://dx.doi.org/10.1117/12.2250332.
Повний текст джерелаPutz, Benedikt, and Gunther Pernul. "Detecting Blockchain Security Threats." In 2020 IEEE International Conference on Blockchain (Blockchain). IEEE, 2020. http://dx.doi.org/10.1109/blockchain50366.2020.00046.
Повний текст джерелаKundráthová, Natália, and Karol Lysina. "New threats in security." In Práce a štúdie. University of Zilina, 2021. http://dx.doi.org/10.26552/pas.z.2021.2.20.
Повний текст джерелаVrana, Radovan. "Confronting internet security threats." In INFuture2017: Integrating ICT in Society. Department of Information and Communication Sciences, Faculty of Humanities and Social Sciences, University of Zagreb, Croatia, 2017. http://dx.doi.org/10.17234/infuture.2017.25.
Повний текст джерелаGefner, V. V., and I. S. Gefner. "Modeling Information Security Threats." In Научные тенденции: Вопросы точных и технических наук. ЦНК МОАН, 2018. http://dx.doi.org/10.18411/spc-12-06-2018-04.
Повний текст джерелаSiami Namin, Akbar, Rattikorn Hewett, Keith S. Jones, and Rona Pogrund. "Sonifying Internet Security Threats." In CHI'16: CHI Conference on Human Factors in Computing Systems. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2851581.2892363.
Повний текст джерелаGeorgiana Dorobantu, Octavia, and Simona Halunga. "Security threats in IoT." In 2020 International Symposium on Electronics and Telecommunications (ISETC). IEEE, 2020. http://dx.doi.org/10.1109/isetc50328.2020.9301127.
Повний текст джерелаKohli, Harpreet, Dale Lindskog, Pavol Zavarsky, and Ron Ruhl. "An Enhanced Threat Identification Approach for Collusion Threats." In 2011 Third International Workshop on Security Measurements and Metrics (Metrisec). IEEE, 2011. http://dx.doi.org/10.1109/metrisec.2011.11.
Повний текст джерелаЗвіти організацій з теми "Security threats"
Ravikumar, Jeevarathinam. Cyber Security Threats - Past|Present|Future. Denmark: River Publishers, August 2017. http://dx.doi.org/10.13052/popcas016.
Повний текст джерелаKastner, Ryan, and Ted Huffmire. Threats and Challenges in Reconfigurable Hardware Security. Fort Belvoir, VA: Defense Technical Information Center, July 2008. http://dx.doi.org/10.21236/ada511928.
Повний текст джерелаWahyono, Pujo. Transnational Crime and Security Threats in Indonesia. Fort Belvoir, VA: Defense Technical Information Center, March 2010. http://dx.doi.org/10.21236/ada518422.
Повний текст джерелаYi, J., T. Clausen, and U. Herberg. Security Threats to Simplified Multicast Forwarding (SMF). RFC Editor, November 2016. http://dx.doi.org/10.17487/rfc7985.
Повний текст джерелаTschofenig, H., and D. Kroeselberg. Security Threats for Next Steps in Signaling (NSIS). RFC Editor, June 2005. http://dx.doi.org/10.17487/rfc4081.
Повний текст джерелаResearch Institute (IFPRI), International Food Policy. Migration: Tightening borders and threats to food security. Washington, DC: International Food Policy Research Institute, 2018. http://dx.doi.org/10.2499/9780896292970_05.
Повний текст джерелаAlbright, David E. Threats to US Security in a Postcontainment World. Fort Belvoir, VA: Defense Technical Information Center, April 1992. http://dx.doi.org/10.21236/ada271602.
Повний текст джерелаFord, James L., and C. R. Schuller. Controlling Threats to Nuclear Security: A Hollistic Model. Fort Belvoir, VA: Defense Technical Information Center, June 1997. http://dx.doi.org/10.21236/ada421832.
Повний текст джерелаYi, J., U. Herberg, and T. Clausen. Security Threats for the Neighborhood Discovery Protocol (NHDP). RFC Editor, April 2014. http://dx.doi.org/10.17487/rfc7186.
Повний текст джерелаBlank, Stephen J. Threats to Russian Security: the View From Moscow. Fort Belvoir, VA: Defense Technical Information Center, July 2000. http://dx.doi.org/10.21236/ada382720.
Повний текст джерела