دانلود و نمایش مقالات مرتبط با امنیت سیستم های اطلاعاتی::صفحه 1
دانلود بهترین مقالات isi همراه با ترجمه فارسی 2

با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد). 

نتیجه جستجو - امنیت سیستم های اطلاعاتی

تعداد مقالات یافته شده: 1
ردیف عنوان نوع
1 System Integration and Security of Information Systems
سیستم ادغام و امنیت سیستم های اطلاعاتی-2017
The frequency of unauthorized actions to information systems (IS) in the process of their integration is steadily increasing, which inevitably leads to huge financial and material losses. According to statistics, internal users of IS, commit more than half of all violations. All of this forms "a dangerous group of risk ". Existing approaches for IS security are mainly provided by specialized tools of differentiation of user access to information resources. At the same time each user is assigned certain rights, in accordance with which it is permitted/prohibited local access to information is stored in PC, or remote access via communication links to information available on other PC.After analyzing we identified 2 major vulnerabilities: tools of differentiation of local access are not able to provide protection against the actions of offenders are not directly related to obtaining unauthorized access to IS resources and tools of differentiation of remote access does not provide protection from network by internal users of the system.The results of this research will lead to an improvement of the process of ensuring effective protection against threats to information security in the IS.© 2016 The Authors. Published by Elsevier B.V.Peer-review under responsibility of organizing committee of the scientific committee of the international conference; ICTE 2016.© 2017 The Authors. Published by Elsevier B.V. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).Peer-review under responsibility of organizing committee of the scientific committee of the international conference; ICTE 2016
Keywords: Information system | Intrusion detection system | Behavioral method | Signature method | Security of information systems
مقاله انگلیسی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi
بازدید امروز: 1181 :::::::: بازدید دیروز: 0 :::::::: بازدید کل: 1181 :::::::: افراد آنلاین: 60