Information security management frameworks and strategies in higher education institutions: a systematic review
J Merchan-Lima, F Astudillo-Salinas… - Annals of …, 2021 - Springer
Effective information security management (ISM) practices to protect the information assets
of organizations from security intrusions and attacks is imperative. In that sense, a systematic …
of organizations from security intrusions and attacks is imperative. In that sense, a systematic …
Cyber security strategies for higher education institutions
LA Alexei - Journal of Engineering Sciences, 2021 - ibn.idsi.md
Due to the large volume of data they manage, Higher Education Institutions (HEIs) are
perfect targets for cyber attackers. University networks are open in design, decentralized and …
perfect targets for cyber attackers. University networks are open in design, decentralized and …
Compliance with saudi NCA-ECC based on ISO/IEC 27001
T Alsahafi, W Halboob, J Almuhtadi - Tehnički vjesnik, 2022 - hrcak.srce.hr
Sažetak Organizations are required to implement an information security management
system (ISMS) for making a central cybersecurity framework, reducing costs, treating risks …
system (ISMS) for making a central cybersecurity framework, reducing costs, treating risks …
Risk Assessment on Information Asset an academic Application Using ISO 27001
L Haris - 2018 6th International Conference on Cyber and IT …, 2018 - ieeexplore.ieee.org
This research an assessment of the risk correlated with information security related to assets
within an academic application at a university. Universities should value data as a critical …
within an academic application at a university. Universities should value data as a critical …
8‐Hydroxyquinoline‐Methionine Mixed Ligands Metal Complexes: Preparation and Their Antioxidant Activity
The purpose of this investigation is to synthesize mixed ligand complexes of first, second,
and third row transition metals including Cr (III), Mn (II), Fe (III), Co (II), Ni (II), Cu (II), Zn (II) …
and third row transition metals including Cr (III), Mn (II), Fe (III), Co (II), Ni (II), Cu (II), Zn (II) …
Exploring the Feasibility of Developing a Customized IDS/IPS Security Control for Computer Network Security
RA Morgan - 2021 - search.proquest.com
Intrusion detection systems (IDS) and intrusion prevention systems (IPS) are predominantly
used for computer network security. Cybersecurity attacks are constantly evolving, thus tools …
used for computer network security. Cybersecurity attacks are constantly evolving, thus tools …
Cadrul sistemic de securitate a comunicațiilor electronice pentru instituțiile de învățământ superior din Republica Moldova
A ALEXEI - 2023 - repository.utm.md
Scopul: realizarea cercetărilor privind elaborarea unui cadru sistemic de securitate a
comunicațiilor electronice (CSSCE) care va contribui la securizarea e-serviciilor academice …
comunicațiilor electronice (CSSCE) care va contribui la securizarea e-serviciilor academice …
Analysis of security frameworks implemented in HEI's
With the increasing use of new information technologies in the activity of HEIs, the need to
protect information has emerged. Information security addresses several issues, not just IT …
protect information has emerged. Information security addresses several issues, not just IT …
Enhancing Security of Information Systems in Tanzania: The Case of Education Sector
M Mshangi - 2020 - repository.out.ac.tz
The ICT initiatives and ICT use are on the rise across the global including the education
sector in Tanzania. Departments, agencies, authorities, and ministries responsible for …
sector in Tanzania. Departments, agencies, authorities, and ministries responsible for …
Risk Assessment at it Company by Focusing on Information Security Area Using Iso 27001: 2022
AR Nugroho, N Legowo - Syntax Literate; Jurnal Ilmiah …, 2022 - jurnal.syntaxliterate.co.id
Modern technology companies should prioritize information security by focusing on system
vulnerabilities and adopting a risk management approach based on the ISO/IEC 27001 …
vulnerabilities and adopting a risk management approach based on the ISO/IEC 27001 …