Skip to main content
This presentation captures the historical adaptation of medieval warriors’ methods for security and thwarts toward adversarial attacks on fortifications for protective areas. History can often be a good teacher for modern day designers... more
Securing sensitive organizational data has become increasingly vital to organizations. An Information Security Management System (ISMS) is a systematic approach for establishing, implementing, operating, monitoring, reviewing, maintaining... more
"Gap between technology and information risks threaten Europe’s SMEs • Decision makers in western European SMEs are agreed that information security is the highest risk to business. The top risk, identified by 66% of SMEs from a range of... more
These days, financial institutions such as banks are highly exposed to different cyberattacks and their electronic payment system is among the targets of the attack. This study is aimed at assessing the information security management... more
Lack of alignment between information technology (IT) and the business is a problem facing many organizations. Most organizations, today, fundamentally depend on IT. When IT and the business are aligned in an organization, IT delivers... more
SIEM ürünleri ve bu ürünlerin performans analizleri ürünleri değerlendirme açısından çok önemlidir. SIEM ürünlerinin çalışma performansları, gerek duydukları kaynaklar (CPU, RAM, DISK) ve ihtiyaç duyulan EPS değerlerinde nasıl bir... more
Information is the key asset of all organizations and can exist in many forms. It can be printed or written on paper, stored electronically, transmitted by mail or by electronic means, shown in films, or spoken in conversation. In today's... more
The change in IT networks in the recent years has changed the role, definition and the scope of skills and responsibilities of a CISO. This paper provides an overview of the changing environments and the current state of a CISO. The paper... more
Abstract — In this paper authors will discuss about (digital) privacy. They will try to define a new approach to defining a digital privacy and propose a framework for «calculating» a percentage of privacy in a specific case. Most... more
This paper identifies and analyzes governance roles and tasks in SOA security governance at macro level. Drawing from Information Security Management standards and frameworks on one hand and SOA considerations on the other hand, the... more
Among various cyber threats, a DDoS attack is one of the major Internet threats that can affect anyone and even cause tremendous financial damage to organization that uses cloud-based services, while the mitigation of this threat can be... more
A Security Operations Center (SOC) is an organized and highly skilled team whose mission is to continuously monitor and improve an organization's security posture while preventing, detecting, analyzing, and responding to cyber security... more
Know-how and information are essential for people and private or governmental organizations. As informatics and Internet develops, the vulnerability of information protection is rising everyday, mainly due to the facility of storage into... more
This article provides a general introduction to the subject of Cryptology, Crytography and Crytoanalysis and explains the terminology and the practical application of security techniques… In recorded History , technological innovations... more
Back cover text: Real Social Science presents a new, hands-on approach to social inquiry. The theoretical and methodological ideas behind the book, inspired by Aristotelian phronesis, represent an original perspective within the social... more
Knowledge synthesis report submitted to the Social Sciences and Humanities Research Council of Canada Key Messages Background Knowledge and skills in the areas of information security, information privacy, and copyright/intellectual... more
This article examines five common misunderstandings about case-study research: (a) theoretical knowledge is more valuable than practical knowledge; (b) one cannot generalize from a single case, therefore, the single-case study cannot... more
RESUMO Este artigo tem como objetivo descrever e divulgar um processo de gestão do risco de Segurança da Informação e Cibersegurança devido à importância do mesmo no design, implementação e operação de um Sistema de Gestão de Segurança da... more
In this paper, we describe research into the use of baselining for enhancing SIEM Correlation rules. Enterprise grade software has been updated with a capability that identifies anomalous events based on baselines as well as rule based... more
International Journal on Cryptography and Information Security ( IJCIS) is an open access peer reviewed journal that focuses on cutting-edge results in applied cryptography and Information security. It aims to bring together scientists,... more
O objetivo principal desta publicação (Livro) é procurar responder à questão: – Como realizar o design, a implementação e operação de um Sistema de Gestão de Segurança de informação em uma Organização inserida num ambiente competitivo ou... more
Management information system can be compared to the nervous system of a company. Its malfunction may cause adverse effects in many different areas of the company. Information Security Management is understood as tool of the information... more
King Abdullah Medical Complex in Jeddah (KAMCJ) is a 500-bed hospital with highly qualified staff, advanced equipment’s and technologies. The hospital provides a wide range of medical services round the clock. Equipped with the latest... more
Phronetic organizational research is an approach to the study of management and organizations focusing on ethics and power. It is based on a contemporary interpretation of the Aristotelian concept phronesis, usually as ‘prudence’.... more
With increasing dependency on IT infrastructure, the main objective of a system administrator is to maintain a stable and secure network, with ensure that the network is robust enough against malicious network users like attackers and... more
Az Informatikai Biztonsági Irányítási Rendszer1 (IBIR) az ISO 27001:2005 szabvány alapvető fogalma. Az IBIR egy általános irányítási rendszer, amely az üzleti kockázat elemzésen alapul, megállapítja, megvalósítja, üzemelteti, ellenırzi,... more
SWOT analysis is an analytical method used in management to understand strengths, weaknesses, opportunities and threats of an organization. It has been used widely since 1960s. Conventional management literature has references to SWOT... more