共查询到20条相似文献,搜索用时 15 毫秒
1.
In this paper, the authors analyse how educational institutions behave in relation with the contents available through the Web. They also reflect on the features of the currently available information managers, from an educational point of view. They found there is a lack of tools for information management at low scale when it has to be used as a resource for teaching and learning whether at secondary or university level. Finally, they propose a solution, which consists of naming a ‘small virtual educational library’ (SVEL), and they show how it works in Physics education context. 相似文献
2.
3.
王静 《网络安全技术与应用》2014,(1):167-168
现如今,伴随我国网络信息化步伐的加快,在高校强化对大学生的网络信息安全教育意义重大、影响深刻。本文通过分析高校学生开展网络信息安全教育的必要性及暴露的问题,就今后大学生进行网络信息安全教育工作提出若干可行性见解。 相似文献
4.
5.
6.
7.
8.
Empirical findings from surveys and in-depth interviews with information security managers and users indicate that a digital divide exists between these groups in terms of their views on and experience of information security practices. Information security professionals mainly regard users as an information security threat, whereas users believe themselves that they are an untapped resource for security work. The limited interaction between users and information security managers results in a lack of understanding for the other's point of view. These divergent views on and interpretations of information security mean that managers tend to base their practical method on unrealistic assumptions, resulting in management approaches that are poorly aligned with the dynamics of the users' working day. 相似文献
9.
当前,保证网络信息安全是促进信息管理的前提,在计算机网络信息管理中占有拳足轻重的地位笔者结合自身工作实践,在本文中阐述了网络信息安全管理的概念及分类,分析了当前网络信息的安全问题,并在此基础上,提出了进一步加强信息管理的对策措施,以期对业内同行有所参考借鉴。 相似文献
10.
Fred Cohen 《Network Security》1999,1999(10):7-10
Computing operates in an almost universally networked environment, but the technical aspects of information protection have not kept up. As a result, the success of information security programs has increasingly become a function of our ability to make prudent management decisions about organizational activities. Managing Network Security takes a management view of protection and seeks to reconcile the need for security with the limitations of technology. 相似文献
11.
12.
Some quality models, such as IS0 9126, fail to include computer security. The author explains why security is an essential but difficult facet of quality. As a software professional, you can take several actions to improve the security of your code: (1) learn the techniques of security; (2) when incorporating security features into a system, think like the attacker, i.e. consider each point as a potential weakest link; and, finally, (3) consult an expert 相似文献
13.
Hulisi Öğüt 《Computers & Mathematics with Applications》2013,65(9):1234-1253
Intrusion Detection Systems (IDSs) have become an important element of the Information Technology (IT) security architecture by identifying intrusions from both insiders and outsiders. However, security experts questioned the effectiveness of IDSs recently. The criticism known as Base Rate fallacy states that when IDS raises an alarm, the event is more likely to be benign rather than intrusive since the proportion of benign activity is significantly larger than that of intrusive activity in the user population. In response to too many false alarms, system security officers (SSO) either ignore alarm signals or turn off the IDS as the information provided by IDS is very skeptical. To alleviate this problem of IDSs, Ogut et al. (2008) [6] suggest that the firm may choose to wait to get additional signal and to make better decision about user type. One of the limitations of their model is that configuration point at which IDSs operate (the false negative and false positive rates) is exogenously given. However, the firm trying to minimize expected cost should also make a decision regarding the configuration level of IDSs since these probabilities are one of the determinants of future cost. Therefore, we extend Ogut et al. (2008) [6] by considering configuration and waiting time decisions jointly in this paper. We formulate the problem as dynamic programming model and illustrate the solution procedure for waiting time and configuration decision under optimal policy when cost of undetected hacker activity follows step wise function. As it is difficult to obtain waiting time and configuration decision under optimal policy, we illustrate the solution procedures for under myopic policy and focus on the characteristics of configuration decision under myopic policy. Our numerical analysis suggested that configuration decision is as important as waiting time decision to decrease the cost of operating IDS. 相似文献
14.
《Computer Fraud and Security Bulletin》1993,1993(10):11-12
15.
晏国勋 《网络安全技术与应用》2013,(8):100-104
计算机和通信网络的广泛应用,一方面为人们的生活和工作带来了极大的方便,另一方面也带来了许多亟待解决的问题,以“棱镜门”事件为例,信息的安全性就是其中的重中之重.信息安全性主要体现在两个方面:信息的保密性和认证性.保密性的目的是防止对手破译系统中的机密信息.认证的目的主要有两个,一个是验证信息发送者是真的而不是冒充的;另一个是验证信息的完整性,即信息在传输和处理的过程中没有被篡改.加密技术是保证信息安全的关键技术,常用的加密技术有:对称密钥加密、公开密钥加密、哈希函数加密等,其应用有:数字认证及授权,安全协议等.而一系列的加密技术都依赖于密码学技术.本文将主要通过对密码学及各种加密技术的研究与分析,来论述加密技术与信息安全之间的不可分割的关系及应用. 相似文献
16.
17.
Karin Hedström Ella Kolkowska Fredrik Karlsson J.P. Allen 《The Journal of Strategic Information Systems》2011,20(4):373-384
A business’s information is one of its most important assets, making the protection of information a strategic issue. In this paper, we investigate the tension between information security policies and information security practice through longitudinal case studies at two health care facilities. The management of information security is traditionally informed by a control-based compliance model, which assumes that human behavior needs to be controlled and regulated. We propose a different theoretical model: the value-based compliance model, assuming that multiple forms of rationality are employed in organizational actions at one time, causing potential value conflicts. This has strong strategic implications for the management of information security. We believe health care situations can be better managed using the assumptions of a value-based compliance model. 相似文献
18.
19.
围绕信息安全实验平台建设,探讨相关的内容和技术,并通过比较说明OSI参考模型和安全服务及安全机制的对应关系,分析实验平台的服务功能和技术支持,提出信息安全实验平台的参考框架,可以为师生创造一个内容丰富、功能稳定、安全真实的实验环境. 相似文献
20.