Inf. Secur. J. A Glob. Perspect.最新文献

筛选
英文 中文
From the Editor 来自编辑
Inf. Secur. J. A Glob. Perspect. Pub Date : 1900-01-01 DOI: 10.1080/10658989509342471
D. Parker
{"title":"From the Editor","authors":"D. Parker","doi":"10.1080/10658989509342471","DOIUrl":"https://doi.org/10.1080/10658989509342471","url":null,"abstract":"","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130452481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Building an Automated Security Monitor 构建自动安全监视器
Inf. Secur. J. A Glob. Perspect. Pub Date : 1900-01-01 DOI: 10.1080/19393559308551331
James E. Molini
{"title":"Building an Automated Security Monitor","authors":"James E. Molini","doi":"10.1080/19393559308551331","DOIUrl":"https://doi.org/10.1080/19393559308551331","url":null,"abstract":"No company can survive in the 1990s without the ability to rapidly access information from remote locations. Remote access unfortunately creates new opportunities to penetrate computer systems. It is not unusual for an Internet host owner to find that an unauthorized person has been browsing sensitive files. Hackers can hit hundreds of systems at once, pulling information back to an intermediate location for analysis. Although the hacking of mainframes is less common than that of micro- and minicomputers, it is still an important concern, given that by one estimate, 80% of all critical corporate data is stored on IBM mainframe systems. In response to these threats, a security manager may spend years implementing rigorous policies and controls for routine system auditing and violation reporting. Yet, in an ever-changing environment, how can the security manager be assured that these controls really work to protect critical information? Demand for quick system access and remote use continues to chip away at...","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127565324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security in Cyberspace (and Some Legal Issues) 网络空间安全(及一些法律问题)
Inf. Secur. J. A Glob. Perspect. Pub Date : 1900-01-01 DOI: 10.1080/10658989509342507
R. Moeller
{"title":"Security in Cyberspace (and Some Legal Issues)","authors":"R. Moeller","doi":"10.1080/10658989509342507","DOIUrl":"https://doi.org/10.1080/10658989509342507","url":null,"abstract":"","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128940699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comprehensive List of Threats To Information 信息威胁的综合列表
Inf. Secur. J. A Glob. Perspect. Pub Date : 1900-01-01 DOI: 10.1080/19393559308551348
D. Parker
{"title":"A Comprehensive List of Threats To Information","authors":"D. Parker","doi":"10.1080/19393559308551348","DOIUrl":"https://doi.org/10.1080/19393559308551348","url":null,"abstract":"Policies, standards, surveys, and assessment questionnaires do not currently provide consistent or complete lists of threats to information for identifying controls, conducting assessments, or establishing priorities in information security. The usual short list of four common threats — unauthorized modification, unauthorized use, destruction, and disclosure — is clearly incomplete and redundant. For example, more extensive lists often include fraud, theft, sabotage, and espionage. However, these threats are legal abstractions that require expertise in criminal law to understand. Often, users and even security specialists don't understand the criminal legal implications of these terms or have a distorted view of them. A further problem is that these lists typically fail to include some of the most common threats to organizations as shown by actual experience of information loss. These include such important violations of the law as trespass, burglary, extortion, and larceny, as well as such general threat...","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130857838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Protecting Business Secrets in an EDI/CALS Environment 在EDI/CALS环境中保护商业秘密
Inf. Secur. J. A Glob. Perspect. Pub Date : 1900-01-01 DOI: 10.1080/10658989409342439
W. Madsen
{"title":"Protecting Business Secrets in an EDI/CALS Environment","authors":"W. Madsen","doi":"10.1080/10658989409342439","DOIUrl":"https://doi.org/10.1080/10658989409342439","url":null,"abstract":"","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131692088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Macintosh Security and Data Integrity Products 麦金塔安全和数据完整性产品
Inf. Secur. J. A Glob. Perspect. Pub Date : 1900-01-01 DOI: 10.1080/19393559308551340
M. I. Sobol
{"title":"Macintosh Security and Data Integrity Products","authors":"M. I. Sobol","doi":"10.1080/19393559308551340","DOIUrl":"https://doi.org/10.1080/19393559308551340","url":null,"abstract":"Access control, virus prevention, and data integrity have always been concerns for management and information security personnel. Until recently, most of the efforts in this area have been devoted to the IBM PC and compatible equipment. During the past year or so, however, Apple Computer and its Macintosh line of microcomputers have become increasingly popular in business environments. Because of this emerging interest in the Mac and because of the ongoing concern for information protection and data integrity, several vendors are now marketing security products for the Macintosh line of microcomputers. This column reviews several of those products.","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115366328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Disaster Recovery Planning Software 容灾规划软件
Inf. Secur. J. A Glob. Perspect. Pub Date : 1900-01-01 DOI: 10.1080/19393559308551328
M. I. Sobol
{"title":"Disaster Recovery Planning Software","authors":"M. I. Sobol","doi":"10.1080/19393559308551328","DOIUrl":"https://doi.org/10.1080/19393559308551328","url":null,"abstract":"During the 1970s and early 1980s, a handful of companies were promoting disaster recovery services ranging from skeletal disaster plans, cold sites, and consulting services to full-blown hot-site recovery services. For the most part, these companies were selling on the basis of scare tactics. They told us that not only could disasters happen, they could damage and destroy data centers, computer systems, and information. Few organizations heeded their warnings, however, even though those of us in the computer security business knew the threats were real. The big challenge back then was to sell the idea of disaster recovery planning to management. Now the 1990s are upon us. Our reliance on computers has increased; millions of computers are now used in various business environments. Awareness of disasters has increased as well; there are now many examples of disasters to back up our arguments when we are trying to convince senior management of the need for disaster recovery planning.","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"00 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117091026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
From the Editor 来自编辑
Inf. Secur. J. A Glob. Perspect. Pub Date : 1900-01-01 DOI: 10.1080/10658989509342501
D. Parker
{"title":"From the Editor","authors":"D. Parker","doi":"10.1080/10658989509342501","DOIUrl":"https://doi.org/10.1080/10658989509342501","url":null,"abstract":"","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124057774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Globalization of Services: GATT, NAFTA, and the Threat to Information Security 服务全球化:关贸总协定、北美自由贸易协定和对信息安全的威胁
Inf. Secur. J. A Glob. Perspect. Pub Date : 1900-01-01 DOI: 10.1080/10658989509342495
W. Madsen
{"title":"Globalization of Services: GATT, NAFTA, and the Threat to Information Security","authors":"W. Madsen","doi":"10.1080/10658989509342495","DOIUrl":"https://doi.org/10.1080/10658989509342495","url":null,"abstract":"Taylor & Francis makes every effort to ensure the accuracy of all the information (the “Content”) contained in the publications on our platform. However, Taylor & Francis, our agents, and our licensors make no representations or warranties whatsoever as to the accuracy, completeness, or suitability for any purpose of the Content. Any opinions and views expressed in this publication are the opinions and views of the authors, and are not the views of or endorsed by Taylor & Francis. The accuracy of the Content should not be relied upon and should be independently verified with primary sources of information. Taylor and Francis shall not be liable for any losses, actions, claims, proceedings, demands, costs, expenses, damages, and other liabilities whatsoever or howsoever caused arising directly or indirectly in connection with, in relation to or arising out of the use of the Content.","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124735818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Creating a Secure EDI Environment 创建安全的EDI环境
Inf. Secur. J. A Glob. Perspect. Pub Date : 1900-01-01 DOI: 10.1080/10658989509342491
Christopher Zoladz
{"title":"Creating a Secure EDI Environment","authors":"Christopher Zoladz","doi":"10.1080/10658989509342491","DOIUrl":"https://doi.org/10.1080/10658989509342491","url":null,"abstract":"","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129517495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信