Bu kaydın yasal hükümlere uygun olmadığını düşünüyorsanız lütfen sayfa sonundaki Hata Bildir bağlantısını takip ederek bildirimde bulununuz. Kayıtlar ilgili üniversite yöneticileri tarafından eklenmektedir. Nadiren de olsa kayıtlarla ilgili hatalar oluşabilmektedir. MİTOS internet üzerindeki herhangi bir ödev sitesi değildir!

A Comparative Study Of Common Cyber Security Policies For Different Enterprises

Oluşturulma Tarihi: 16-10-2017

Niteleme Bilgileri

Tür: Tez

Alt Tür: Yüksek Lisans Tezi

Yayınlanma Durumu: Yayınlanmamış

Dosya Biçimi: PDF

Dil: İngilizce

Konu(lar): TEKNOLOJİ,

Yazar(lar): Abduladheem, Maha Samer Abduladheem (Yazar),

Emeği Geçen(ler): Mishra, Alok (Danışman),

Anahtar Kelimeler

Cyber Security Policies; Security Of Enterprises ; Privacy policies ;security of information and communication technology;Access control policies ;network policies


Özet

Cyber security represents the essential issue and takes the top priority not only forenterprises of all sizes but also national security. Nowadays, many enterprises investheavily in cyber security to protect their cyber environments and information andcommunication technology. Therefore, several enterprises embrace security policies as oneof security defense solutions to safeguard from any attacks before the damage is done andnegative effect occurs on the business of the enterprise. In this study, significant andcommon cyber security policies of different enterprises are compared and discussed. Theseenterprises include health sector, financial sector, educational sector, aviation sector, ande-commerce. The purpose of this study is to build robust and inclusive cyber security ineach company and enterprise. The result of this study indicates that there are tenimportant common security policies should be applied in each enterprise and organization.These policies include privacy policy, data protection policy, data retention policy,information security policy, E-mail security policy, physical security policy, website securitypolicy, cloud security policy, network security policy, and access control policy.Additionally, results of this study show some cyber security policies to be more critical andimportant from enterprise to enterprise. That difference in priority of these securitypolicıes depend on the nature of information under control enterprises and security needsof enterprises to these security policies.


İçindekiler



Açıklamalar



Haklar



Notlar



Kaynakça


Atıf Yapanlar

Gözat Sayfasına Dön

 

Sosyal Medya ve Araçlar

İstatistikler

  • Kayıt
    • Bu ay: 5
    • Toplam: 2326
  • Online
    • Ziyaretçi: 29
    • Üye: 0
    • Toplam: 29

Detaylı İstatistikler