Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Strategic Approaches in Network Communication and Information Security Risk Assessment
N Alsafwani, Y Fazea, F Alnajjar - Information, 2024 - mdpi.com
Risk assessment is a critical sub-process in information security risk management (ISRM)
that is used to identify an organization's vulnerabilities and threats as well as evaluate …
that is used to identify an organization's vulnerabilities and threats as well as evaluate …
Systematic Literature Review on Information Security Risk Management in Public Service Organizations
R Andita, F Aditya - Jurnal Teknik Informatika (Jutif), 2024 - jutif.if.unsoed.ac.id
For an organization, information security is a priority. Within the rapid growth of information
technology, information becomes easier to access, processed, and used in organization …
technology, information becomes easier to access, processed, and used in organization …
Designing information security risk management on bali regional police command center based on ISO 27005
The application of information technology in government agencies is in line with Indonesian
Presidential Regulation 95/2018 concerning Electronic-Based Government Systems …
Presidential Regulation 95/2018 concerning Electronic-Based Government Systems …
Impact of Implementation of Information Security Risk Management and Security Controls on Cyber Security Maturity (A Case Study at Data Management Applications …
EJW Endro Joko Wibowo… - … Informasi (Journal of …, 2022 - eprints.triatmamulya.ac.id
Information security is an important concern for governments and industry due to the
increase in cyber attacks during Covid-19. The government is obliged to maintain …
increase in cyber attacks during Covid-19. The government is obliged to maintain …
Autonomous Vehicles an overview on system, cyber security, risks, issues, and a way forward
MA Islam, S Alqahtani - arxiv preprint arxiv:2309.14213, 2023 - arxiv.org
This chapter explores the complex realm of autonomous cars, analyzing their fundamental
components and operational characteristics. The initial phase of the discussion is …
components and operational characteristics. The initial phase of the discussion is …
Information security risk management planning of digital certificate management case study: Balai sertifikasi elektronik
Otoritas Sertifikat Digital (OSD) is a certificate authority held by Balai Sertifikasi Elektronik
(BSrE) of the Badan Siber dan Sandi Negara (BSSN). Digital certificate management is the …
(BSrE) of the Badan Siber dan Sandi Negara (BSSN). Digital certificate management is the …
[PDF][PDF] Modelo de evaluación del Dominio Control de Acceso de la norma ISO 27002 aplicado al proceso de Gestión de Bases de Datos
S Patiño, A Caicedo, ER Guaña - Revista Ibérica de Sistemas e …, 2019 - researchgate.net
en el presente estudio se realizó el análisis de las vulnerabilidades del proceso de Gestión
de bases de datos de dos instituciones basado en el dominio control de acceso de la norma …
de bases de datos de dos instituciones basado en el dominio control de acceso de la norma …
Information Security Risk Assessment for the Malaysian Aeronautical Information Management System
A Alwi, KAZ Ariffin - 2018 Cyber Resilience Conference (CRC), 2018 - ieeexplore.ieee.org
Aviation-related information management system as well as other information systems suffer
from the problem of security risk. This security risk is not an aviation-specific problem and …
from the problem of security risk. This security risk is not an aviation-specific problem and …
[PDF][PDF] A Risk Assessment of the Hungarian Eid Card
N Nyári, A Kerti - Scientific Bulletin-Nicolae Balcescu Land Forces …, 2024 - sciendo.com
The aim of the present study is to provide an insight to a comprehensive risk assessment of
the Hungarian eID card utilizing the ISO/IEC 27005: 2022 standard. Unfortunately, the …
the Hungarian eID card utilizing the ISO/IEC 27005: 2022 standard. Unfortunately, the …
[PDF][PDF] Adopting an ISO/IEC 27005: 2011-based Risk Treatment Plan to Prevent Patients from Data Theft
The concern raised in late 2017 regarding 46.2 million mobile device subscriber's data
breach had the Malaysian police started an investigation looking for the source of the leak …
breach had the Malaysian police started an investigation looking for the source of the leak …