816 resultados para Information security
Resumo:
Audit report on the Wireless E911 Emergency Communication Fund of the Iowa Homeland Security and Emergency Management Division of the Iowa Department of Public Defense for the year ended June 30, 2008
Resumo:
Audit report on the Wireless E911 Emergency Communication Fund of the Iowa Homeland Security and Emergency Management Division of the Iowa Department of Public Defense for the year ended June 30, 2009
Resumo:
Audit report on the Wireless E911 Emergency Communications Fund of the Iowa Homeland Security and Emergency Management Division of the Iowa Department of Public Defense for the year ended June 30, 2010
Resumo:
Audit report on the Wireless E911 Emergency Communications Fund of the Iowa Homeland Security and Emergency Management Division of the Iowa Department of Public Defense for the year ended June 30, 2011
Resumo:
Audit report on the Wireless E911 Emergency Communications Fund of the Iowa Homeland Security and Emergency Management Division of the Iowa Department of Public Defense for the year ended June 30, 2012
Resumo:
We expose the ubiquitous interaction between an information screen and its’ viewers mobile devices, highlights the communication vulnerabilities, suggest mitigation strategies and finally implement these strategies to secure the communication. The screen infers information preferences’ of viewers within its vicinity transparently from their mobile devices over Bluetooth. Backend processing then retrieves up-to-date versions of preferred information from content providers. Retrieved content such as sporting news, weather forecasts, advertisements, stock markets and aviation schedules, are systematically displayed on the screen. To maximise users’ benefit, experience and acceptance, the service is provided with no user interaction at the screen and securely upholding preferences privacy and viewers anonymity. Compelled by the personal nature of mobile devices, their contents privacy, preferences confidentiality, and vulnerabilities imposed by screen, the service’s security is fortified. Fortification is predominantly through efficient cryptographic algorithms inspired by elliptic curves cryptosystems, access control and anonymity mechanisms. These mechanisms are demonstrated to attain set objectives within reasonable performance.
Resumo:
Conceptual Information Systems are based on a formalization of the concept of "concept" as it is discussed in traditional philosophical logic. This formalization supports a human-centered approach to the development of Information Systems. We discuss this approach by means of an implemented Conceptual Information System for supporting IT security management in companies and organizations.