Management and Control of User Devices and Servers in the Context of Information Security.
Vladimir JechOta NovotnýPublished in: IDIMT (2012)
Keyphrases
- information security
- information systems
- information security management
- user authentication
- home environment
- management practices
- countermeasures
- risk analysis
- security issues
- network security
- intrusion detection
- smart card
- user model
- user interface
- security requirements
- control system
- security management
- cyber defense
- senior management
- risk assessment
- databases
- information assurance
- management system
- security risks
- iso iec
- data management
- critical infrastructure
- security level
- knowledge management
- e government
- ubiquitous computing environments
- technical issues
- single user
- low cost
- semi supervised
- privacy concerns
- information technology
- data analysis
- unsupervised learning
- object recognition
- project management