[PDF][PDF] A review on risk mitigation of IT governance
Risk Mitigation (RM) is one of the important activities in risk management of IT governance.
In IT governance project, IT risk mitigation emphasizes taking action early in a project to …
In IT governance project, IT risk mitigation emphasizes taking action early in a project to …
Best practices to minimize data security breaches for increased business performance
FJ Kongnso - 2015 - scholarworks.waldenu.edu
Abstract In the United States, businesses have reported over 2,800 data compromises of an
estimated 543 million records, with security breaches costing firms approximately $7.2 …
estimated 543 million records, with security breaches costing firms approximately $7.2 …
[PDF][PDF] Information security in the digital age: The case of developing countries
IJ Ikenwe, OM Igbinovia, AA Elogie - Chinese Librarianship: An …, 2016 - researchgate.net
Information security is an important issue and a growing concern that affects all sectors in
this digital age. Lack of information security can lead to confidential information being …
this digital age. Lack of information security can lead to confidential information being …
Data management in intellectual property organizations
Through this document, we propose an analysis of methods for improving the management
of computer data in the context of the need to save, protect and secure them. The …
of computer data in the context of the need to save, protect and secure them. The …
A strategic approach to managing security in SCADA systems
M Asgarkhani, E Sitnikova - … of the 13th European Conference on …, 2014 - books.google.com
The internet was started as an open distributed system for researchers and academics
without much concern for cyber security related issues. However, it gradually evolved into a …
without much concern for cyber security related issues. However, it gradually evolved into a …
Deduplication data technologies impact on the backup systems in intellectual property organizations
RC Moisescu, CD Olteanu… - 2022 14th …, 2022 - ieeexplore.ieee.org
The scientific paper presents experimental research on testing deduplication technologies
for data saved in centralized backup systems in IP organizations. This research details the …
for data saved in centralized backup systems in IP organizations. This research details the …
A strategic framework for managing internet security
E Sitnikova, M Asgarkhani - 2014 11th International …, 2014 - ieeexplore.ieee.org
The internet which was originally developed as an open distributed system has since
evolved to become a key platform for connectivity of businesses and communities. Today …
evolved to become a key platform for connectivity of businesses and communities. Today …
Deterring the Digital Dragon
B Lacey - 2024 - researchonline.nd.edu.au
Australia's 21st century has been heavily influenced by a growing number of cyber incidents
ranging from individuals causing extraordinary damage to state-based attacks from …
ranging from individuals causing extraordinary damage to state-based attacks from …
Databases restoration processes in intellectual property organizations
AM Ţîţu, RC Moisescu… - 2023 15th International …, 2023 - ieeexplore.ieee.org
This document represents the original research and analysis of the impact of the use of
advanced technologies for data backup and restore for Informix type databases in cases of …
advanced technologies for data backup and restore for Informix type databases in cases of …
[PDF][PDF] A Review of Security Vulnerabilities, Controls and Models in Networked Environments
The availability of information and communication technologies (ICTs) and network-based
services offer a number of advantages in today's society, for example e-government, e …
services offer a number of advantages in today's society, for example e-government, e …