Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
File sharing is a common practice since the introduction of computer networks. It involves using technology that allows network users to share files that are stored on their individual computers. Peer-to-peer or simply P2P applications, such as those used to share multimedia files, are some of the most common forms of file-sharing technology. However, P2P applications are vulnerable to security risks...
The Online game industry has grown a lot this past decade. Cheating in online games is an aspect of computer games that has so far received skimp attention from researchers on game studies. Cheats does not only affect the cheater but also other players. Cheating has become illegal since it poses security threats. This paper discusses security problems in online games. This study intends to help understand...
Security has emerged as the biggest threat to information systems. System protection mechanisms such as access controls can be fooled by authorized but malicious users, masqueraders, and misfeasors. As a result, serious damage can be caused either because many intrusions are never detected or because the average detection latency is too long. In this paper, we define intrusion confinement thru isolation...
This paper discusses the effects of Sarbanes-Oxley (SOX) Act on corporate information security governance practices. The resultant regulatory intervention forces a company to revisit its internal control structures and asses the nature and scope of its compliance with the law. This paper reviews the implications emerging from the mandatory compliance with Sarbanes-Oxley (SOX) Act. Issues related to...
In an e-enterprise, the tight coupling between business process and the underlying information technology infrastructure amplifies the effect of hardware and software security failures. This accentuates the need for comprehensive security management of the infrastructure. This paper outlined the challenges posed by fulfilling myriad security requirements throughout the various stages of enterprise...
Most access control approaches are based on individual users. Access control should also cover the enterprise wide systems. Role-based access control (RBAC) with the support of cookies is the solution to this problem. Cookies can be used to support RBAC on the Web by storing userspsila role information. However, cookies also have some technical drawbacks. In particular, they do not always accurately...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.