Bu kaydın yasal hükümlere uygun olmadığını düşünüyorsanız lütfen sayfa sonundaki Hata Bildir bağlantısını takip ederek bildirimde bulununuz. Kayıtlar ilgili üniversite yöneticileri tarafından eklenmektedir. Nadiren de olsa kayıtlarla ilgili hatalar oluşabilmektedir. MİTOS internet üzerindeki herhangi bir ödev sitesi değildir!

A Comparative Study Of Common Cyber Security Policies For Different Enterprises

BROWSE_DETAIL_CREATION_DATE: 16-10-2017

BROWSE_DETAIL_IDENTIFIER_SECTION

BROWSE_DETAIL_TYPE: Thesis

BROWSE_DETAIL_SUB_TYPE: Masters

BROWSE_DETAIL_PUBLISH_STATE: Unpublished

BROWSE_DETAIL_FORMAT: PDF Document

BROWSE_DETAIL_LANG: English

BROWSE_DETAIL_SUBJECTS: TECHNOLOGY,

BROWSE_DETAIL_CREATORS: Abduladheem, Maha Samer Abduladheem (Author),

BROWSE_DETAIL_CONTRIBUTERS: Mishra, Alok (Advisor),

BROWSE_DETAIL_TAB_KEYWORDS

Cyber Security Policies; Security Of Enterprises ; Privacy policies ;security of information and communication technology;Access control policies ;network policies


BROWSE_DETAIL_TAB_ABSTRACT

Cyber security represents the essential issue and takes the top priority not only forenterprises of all sizes but also national security. Nowadays, many enterprises investheavily in cyber security to protect their cyber environments and information andcommunication technology. Therefore, several enterprises embrace security policies as oneof security defense solutions to safeguard from any attacks before the damage is done andnegative effect occurs on the business of the enterprise. In this study, significant andcommon cyber security policies of different enterprises are compared and discussed. Theseenterprises include health sector, financial sector, educational sector, aviation sector, ande-commerce. The purpose of this study is to build robust and inclusive cyber security ineach company and enterprise. The result of this study indicates that there are tenimportant common security policies should be applied in each enterprise and organization.These policies include privacy policy, data protection policy, data retention policy,information security policy, E-mail security policy, physical security policy, website securitypolicy, cloud security policy, network security policy, and access control policy.Additionally, results of this study show some cyber security policies to be more critical andimportant from enterprise to enterprise. That difference in priority of these securitypolicıes depend on the nature of information under control enterprises and security needsof enterprises to these security policies.


BROWSE_DETAIL_TAB_TOC



BROWSE_DETAIL_TAB_DESCRIPTION



BROWSE_DETAIL_TAB_RIGHTS



BROWSE_DETAIL_TAB_NOTES



BROWSE_DETAIL_TAB_REFERENCES


BROWSE_DETAIL_TAB_REFERENCED_BYS

BROWSE_DETAIL_GOTO_LIST

 

TEXT_STATS

  • TEXT_RECORD_STATS
    • TEXT_STATS_THIS_MONTH: 3
    • TEXT_STATS_TOTAL: 2444
  • TEXT_ONLINE_STATS
    • TEXT_ONLINE_STATS_TOTALONLINEVISITOR: 60
    • TEXT_ONLINE_STATS_TOTALONLINEUSER: 0
    • TEXT_STATS_TOTAL: 60

LINK_STATS