999 resultados para endpoint security


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This research investigated Australian SMEs (small to medium enterprises), E-business and strategies for security management. Limitations of current approaches and empirical survey results produced the Australian SME E-business Security Methodology. This new approach delivers recommendations to provide e-business security management strategies for micro, small and medium SME e-business systems.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This research develops a framework which allows the many IT security certifications to be compared by stakeholders, such as IT security professionals, employers, universities and governments. The framework employs a novel approach which allow users to tailor the comparison based on their own weightings, whilst taking advantage of standardised research.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Network security, particularly Internet security, is at the forefront of business and government networks. This research has discovered weaknesses in current professional practice, particularly in mitigation strategies to reduce the impacts of security violations in corporate telecommunications and data centres. The importance of integrating security policies, processes and operational practice is demonstrated. Leadership models and innovation mechanisms best suited to improved security design are also identified.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Mainstream security analyses and security models are discussed. The central argument is that the multi-dimensional conditions, which are considered by analysts as central to the security of all collectives, are not representative of all cultures. Therefore, mainstream models are not suitable for every security collective's cultural security requirements.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis presents a comparative analysis of Australian and New Zealand foreign policy in the Pacific with particular emphasis on the Bougainville and Solomon Islands peace interventions. Through a constructivist lens, it argues that New Zealand's policies have been more effective and culturally appropriate than Australia's in recent years.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis develops a framework of key influences that must be considered in order to enable development of an information security culture in Australian small and medium enterprises. The study argues that, by ensuring that key influences are in place, an effective information security culture will evolve.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The study developed a model to help Australian organisations transition toward an improved IT security culture. The IT Security Culture Transition Model improved organisations' IT security awareness, knowledge, attitude and behaviour allowing them to better protect their IT security. The model can be implemented face-to-face and as an e-learning program.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents an innovative fusion-based multi-classifier e-mail classification on a ubiquitous multicore architecture. Many previous approaches used text-based single classifiers to identify spam messages from a large e-mail corpus with some amount of false positive tradeoffs. Researchers are trying to prevent false positive in their filtering methods, but so far none of the current research has claimed zero false positive results. In e-mail classification false positive can potentially cause serious problems for the user. In this paper, we use fusion-based multi-classifier classification technique in a multi-core framework. By running each classifier process in parallel within their dedicated core, we greatly improve the performance of our multi-classifier-based filtering system in terms of running time, false positive rate, and filtering accuracy. Our proposed architecture also provides a safeguard of user mailbox from different malicious attacks. Our experimental results show that we achieved an average of 30% speedup at an average cost of 1.4 ms. We also reduced the instances of false positives, which are one of the key challenges in a spam filtering system, and increases e-mail classification accuracy substantially compared with single classification techniques.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Australian Prime Minister Kevin Rudd has recently announced plans to develop greater regional integration and cooperation in the Asia-Pacific region.

Historically, Australian opinion, however, has expressed some anxiety about forging closer economic, political and security ties with Asia. Using trend data from the Australian Election Study and the Lowy Institute Poll, this article examines changes in Australian public opinion on closer engagement with Asia and whether the Australian public is likely to support the Rudd government’s push towards developing deeper regional diplomacy. The article finds a shift in opinion since the 1990s with a younger generation of voters who are moderately supportive of Australia’s engagement with Asia.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper introduces a practical security model based on key security considerations by looking at a number of infrastructure aspects of Cloud Computing such as SaaS, Utility, Web, Platform and Managed Services, Service commerce platforms and Internet Integration which was introduced with a concise literature review. The purpose of this paper is to offer a macro level solution for identified common infrastructure security requirements. This model with a number of emerged patterns can be applied to infrastructure aspect of Cloud Computing as a proposed shared security approach in system development life cycle focusing on the plan-built-run scope.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Information technology has become the core tool of business organisations’. External and internal threats as well as legal, regulatory and contractual compliance requirements are all combining to make effective information security a key information technology management challenges. This paper describes an undergraduate information technology security management course that provides comprehensive knowledge and skills necessary to manage both strategic and operational aspects of information security. The course covers a broad range of managerial topics in information technology security and makes use of a number of security tools and techniques to complement the theory taught. In this paper, we describe our approach, our experiences and lessons learned for teaching information technology security management course. The paper details the content of the course and outlines how it is taught and assessed.