• No se han encontrado resultados

Information Security

EFFECTS OF SANCTION ON THE MENTALITY OF INFORMATION SECURITY POLICY COMPLIANCE

EFFECTS OF SANCTION ON THE MENTALITY OF INFORMATION SECURITY POLICY COMPLIANCE

... Sanction celerity is seldom investigated in criminology and IS research (D’Arcy & Herath, 2011). Gibbs (1968) argued that the only rationale for an emphasis on celerity is in experimental psychology, particularly in ...

11

Information security in an e-learning environment

Information security in an e-learning environment

... Information security is adequately addressed within a traditional environment due to the fact that traditional education environments are mostly restricted to one physical ...where information ...

6

An information security model based on trustworthiness for enhancing security in on line collaborative learning

An information security model based on trustworthiness for enhancing security in on line collaborative learning

... technological security as a key and transverse factor has been, to the best of our knowledge, little investigated ...However, Information and Communication Technologies (ICT) have been widely adopted and ...

122

Information Security of a Modern Democratic State: Axiological Context

Information Security of a Modern Democratic State: Axiological Context

... of information security, which found a reflection at the legislative level as well and contributed to the legal consolidation of various ...Home Security Act. Accordingly, the Department of Homeland ...

8

Diseño de un manual de procedimientos del sistema contable en la empresa Fevecomex S A S  Basado en la norma técnica colombiana para la seguridad de la información NTC ISO / IEC 27001 / 2006 (Information technology   Security techniques   Information secu

Diseño de un manual de procedimientos del sistema contable en la empresa Fevecomex S A S Basado en la norma técnica colombiana para la seguridad de la información NTC ISO / IEC 27001 / 2006 (Information technology Security techniques Information security management systems Requirements)

... - Security techniques - Information security management systems - Requirements)”, realizado por la estudiante ADRIANA POLANCO VELEZ en el cual me desempeñé cumpliendo la función de Asesor, por tanto ...

78

Hospital information systems: inforamtion sistems architecture, information presentation, cloud computing, information security / Rodrigo García Carmona

Hospital information systems: inforamtion sistems architecture, information presentation, cloud computing, information security / Rodrigo García Carmona

... Since HTTP is stateless, the response includes a session ID, and the server may store user information related to this session.. When the browser makes another request, and includes the [r] ...

56

Life in hybrid reality: problems of psychology and law

Life in hybrid reality: problems of psychology and law

... the information sphere is disclosed by the section II of the Doctrine under consideration, which is dedicated specifically to this ...the information sphere, the Information Security Doctrine ...

8

Quantitative assessment and comparison of cloud service providers' privacy practices

Quantitative assessment and comparison of cloud service providers' privacy practices

... and Information Security Agency) en la Unión Europea, NIST (National Institute of Standards and Technology) en ...(Cloud Security Alliance) a nivel global, entre otros, llevan tiempo trabajando en la ...

8

Marco para el Gobierno de la Seguridad de la Infornación en servicios Cloud Computing.

Marco para el Gobierno de la Seguridad de la Infornación en servicios Cloud Computing.

... An Information Security Governance framework that tackles all the security issues in the Cloud Environment in a uniform manner is not currently ...cloud security, there are no comprehensive ...

310

PseudoRandomSequencesPy Library v 1.0.

PseudoRandomSequencesPy Library v 1.0.

... With the advent of computers and telecommunications, the field of Information Security, once restricted to the military and diplomatic arena, has extended its influence to the civil and commercial scene. ...

11

Informe d'Autors UOC a ISI Web of Knowledge  Maig 2012

Informe d'Autors UOC a ISI Web of Knowledge Maig 2012

... in Information Security and its Application; Communications in Computer and Information Science; 3rd International Conference on Information Security and Assurance, 25th-27th June 2009, ...

5

Implementation plan for an ISMS according to ISO/IEC 27001:2013

Implementation plan for an ISMS according to ISO/IEC 27001:2013

... Information security policies Organization of information security Human resource security Asset management Access control Cryptography Physical and environmental security Operations sec[r] ...

23

Lab - Configuring an Intrusion Prevention System (IPS) Using the CLI and CCP (Instructor Version)

Lab - Configuring an Intrusion Prevention System (IPS) Using the CLI and CCP (Instructor Version)

... The next-generation Java Plug-in must be enabled, and the Security setting must be set to Medium for the CCP configuration of IPS. To support the CCP configuration of IPS, PC-C should be running Java JRE version 6 ...

53

Lab - Securing the Router for Administrative Access (Instructor

Lab - Securing the Router for Administrative Access (Instructor

... How does configuring an enable secret password help protect a router from being compromised by an attack? _______________________________________________________________________________________ ...

61

Lab - (Optional) Configuring a Remote Access VPN Server and Client (Instructor Version)

Lab - (Optional) Configuring a Remote Access VPN Server and Client (Instructor Version)

... If the Cisco Tunneling Control Protocol (cTCP) window displays, do not enable cTCP. Click Next to continue.. Step 8: Review the configuration summary and deliver the commands. Scroll [r] ...

30

Lab - CCNA Security Comprehensive Lab (Instructor Version)

Lab - CCNA Security Comprehensive Lab (Instructor Version)

... This comprehensive lab is divided into nine parts. The parts should be completed sequentially. In Part 1, you will create a basic technical security policy. In Part 2, you configure the basic device settings. In ...

75

Chapter 10 Lab H: Configuring a Site-to-Site IPsec VPN using CCP on an ISR and ASDM on an ASA 5510 (Instructor Version)

Chapter 10 Lab H: Configuring a Site-to-Site IPsec VPN using CCP on an ISR and ASDM on an ASA 5510 (Instructor Version)

... a. The Edit Site-to-Site VP N screen is displayed aft er the commands are delivered. To return to this screen, choose Configure > Security > VPN > Site -to-Site VPN and click the Edit Site to Site VPN ...

43

Lab - Configuring Zone-Based Policy Firewalls (Instructor Version)

Lab - Configuring Zone-Based Policy Firewalls (Instructor Version)

... The newer Cisco IOS Firewall implementation uses a zone-based approach that operates as a function of interfaces instead of access control list. A Zone-Based Policy Firewall (ZBF) allows different inspection policies to ...

35

Lab - Securing Administrative Access Using AAA and RADIUS

Lab - Securing Administrative Access Using AAA and RADIUS

... Press RETURN to get started. Log in to the console as Admin01 with a password of Admin01pass. Were you able to login? Explain. The router verified the account against the local databa[r] ...

35

Lab - Configuring ASA Basic Settings and Firewall Using ASDM

Lab - Configuring ASA Basic Settings and Firewall Using ASDM

... a. After entering the URL above, you should see a security warning about the website security certificate. Click Continue to this website. The ASDM Welcome page will display. From this screen, you can run ...

47

Show all 3457 documents...

Related subjects