PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

The Analysis of Potential Threats to Information Systems and Countermeasures

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
The article presents the results of the analysis of threats to safety of information in enterprises. How information is protected against publication, modification or being erased has also been taken into account. The objective of the analysis is to raise awareness of value of information and the role of security in an IT system.
Słowa kluczowe
Rocznik
Strony
15--24
Opis fizyczny
Bibliogr. 17 poz., rys.
Twórcy
  • Bialystok University of Technology, Poland
autor
  • The Institute of Logistics and Warehousing, Poland
Bibliografia
  • [1] M. Forystek: Audyt informatyczny, InfoAudit, Warszawa 2005.
  • [2] REGULATION OF THE MINISTER OF of 4 September 2015 on internal audit information about work and results of this audit, Journal of Laws 2015, item 1480
  • [3] The Act of 30 June 2005 on Public Finance, Journal of Laws No. 249, item 2104, with later amendments.
  • [4] Common Criteria for Information Technology Security Evaluation Part 3: Security assurance components, Version 3.1, Revision 4, CCMB-2012-09-003, 2012.
  • [5] K. Liderman, A. E. Patkowski: Metodyka LP-A – dziesięć lat później, Przegląd Teleinformatyczny Nr 2, 2013, pp. 65-80.
  • [6] http://www.ensi.net/bcp/metodyka.html
  • [7] APMG International Cyber Security & Resilience: https://apmg-cyber.com/products/cobit5
  • [8] Social-Engineer Newsletter Vol. 07 https://www.social-engineer.org/newsletter/socialengineer-newsletter-vol-07-issue-97/
  • [9] Soni N.: Database Security: Threats and Security Techniques, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 5, Issue 5, ISSN: 2277 128X, 2015.
  • [10] J. Garcia-Alfaro, G. Navarro-Arribas, H. Hartenstein, J. Herrera-Joancomartí: Data Privacy Management, Cryptocurrencies and Blockchain Technology, ESORICS, Springer 2017.
  • [11] Ben-Natan R.: HOWTO Secure and Audit Oracle 10g and 11g, Auerbach Publications, 2009.
  • [12] S. Kulkarni, S. Urolagin: Review of Attacks on Databases and Database Security Techniques, International Journal of Emerging Technology and Advanced Engineering, SSN 2250-2459, Volume 2, Issue 11, 2012.
  • [13] J. Clarke: SQL Injection Attacks and Defense, Second Edition, 2012.
  • [14] Oracle Database Online Documentation, 10g Release 2 (10.2) / Administration, Database Security Guide, https://docs.oracle.com/cd/B19306_01/network.102/b14266/authmeth.htm#i1007525
  • [15] Yadav, R. Shah: Review on Database Access Control Mechanisms and Models International Journal of Computer Applications (0975 – 8887) Volume 120 – No.18, June 2015
  • [16] Basharat, F. A., A. W. Muzaffar: Database Security and Encryption: A Survey Study, International Journal of Computer Applications (0975 – 888), Volume 47– No.12, June 2012.
  • [17] An Oracle White Paper Oracle Label Security with Oracle Database 11g Release 2, 2009.
Uwagi
PL
Opracowanie rekordu w ramach umowy 509/P-DUN/2018 ze środków MNiSW przeznaczonych na działalność upowszechniającą naukę (2018).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-63afa4b7-8153-471a-b5b4-70680d7a3df2
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.