antenna 发表于 2025-3-23 10:43:55

Proof, not Promises: Creating the Trusted Cloudeting the fundamental challenge of getting the right information to the right people over an infrastructure that they can trust. Why? Because clouds and virtualization irrevocably change the nature of control and visibility. Infrastructure becomes virtual, not physical. People access infrastructure

aphasia 发表于 2025-3-23 17:41:10

How Cloud Security Strongly Depends on Process Maturity, Automation and Scaled access control. But only a few of them know the processes inside a data centre needed to produce scalable, dynamic and flexible ICTservices on large scale. The essential elements here are centralization and consequent re-use, virtualization on all levels of the ICT stack, as well as interoperabili

Firefly 发表于 2025-3-23 21:57:41

http://reply.papertrans.cn/47/4604/460383/460383_13.png

Predigest 发表于 2025-3-24 01:54:10

http://reply.papertrans.cn/47/4604/460383/460383_14.png

共同确定为确 发表于 2025-3-24 02:28:05

http://reply.papertrans.cn/47/4604/460383/460383_15.png

dry-eye 发表于 2025-3-24 06:30:31

Information Security Awareness Campaign “Sicher gewinnt!”: A Joint Action of the German Federal Admimprovement of the technical security measures shifts humans more and more into the target of attackers in order to compromise the information assets of an organization. High personal awareness of information security risks and well-trained security managers therefore constitute the first line of inf

朝圣者 发表于 2025-3-24 12:38:54

Pebkac revisited – Psychological and Mental Obstacles in the Way of Effective Awareness Campaignsed them did not pay attention to some very special human factors which make it difficult to change the behavior of certain target groups within an organization intentionally. This article discusses three of them: Memes, reactance and heuristics.

山间窄路 发表于 2025-3-24 18:09:19

http://reply.papertrans.cn/47/4604/460383/460383_18.png

加剧 发表于 2025-3-24 19:09:21

http://reply.papertrans.cn/47/4604/460383/460383_19.png

Myofibrils 发表于 2025-3-25 01:23:54

http://reply.papertrans.cn/47/4604/460383/460383_20.png
页: 1 [2] 3 4 5 6
查看完整版本: Titlebook: ISSE 2011 Securing Electronic Business Processes; Highlights of the In Norbert Pohlmann,Helmut Reimer,Wolfgang Schneider Book 2011 Vieweg+T