The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Until 1976, the Portuguese electrical sector was fragmented into several companies operating at regional or even local scale. In the aftermaths of the April Revolution of1974, there was large-scale nationalization program to which the electrical sector was no exception. Electricidade de Portugal (EDP) was created in 1976 with the fusion of 13 nationalized companies. Several development programs were...
Many security related big data problems, including document, traffic, and system log analysis require analysis of unstructured text. Consider the task of analyzing company documents for secure storage. Some might be too sensitive to put on a public cloud and require private storage with associated backup overhead, some may safe on the cloud in encrypted form, and some may be sufficiently non-sensitive...
Development of Cloud Computing it is essential to develop the awareness of usage. Crowd of people use any day, on any device, from anywhere. It is necessary to handle those wide scale of users who want to keep their data in safe, and preserve their identity in the cyberspace. Cloud Computing Service Providers have to evolve their platforms as simply as it can be — but it should be given more responsibility...
We have heard and read many times in the last several decades that the most important asset of an organization is the knowledge of its employees. To allow an easy access to knowledge, organizations are implementing Knowledge Repositories. While this type of automation made it easy to store and distribute knowledge, it also made it easy to move knowledge outside the boundaries of a company. Organizations...
Phishing, elicitation, and impersonation techniques are performed using multiple forms, targeting content specific to the delivery modality, such as email, social media, and general browser communications. Education to increase awareness is one mechanism to combat phishing. Average email and internet users are less attentive to media warnings and training materials provided by employers than they...
With comprehensive analysis towards the status quo of CNPC overseas oil and gas business and the dilemma faced by current leaders and cadres, this article tries to find out demand elements of the training of leaders and cadres suitable for further development of CNODC, and present constructive suggestions and opinions to provide management talent for sustainable development of CNODC.
This paper analyzes the features of electronic information equipment support under new circumstances objectively, and analyzes the pattern of electronic information equipment maintenance and the reliability of rasterized electronic information equipment maintenance.
Supply chain integrity (SCI) is emerging as one of the top security issues facing critical systems. The government's reliance on commercial off-the-shelf (COTS) products is apparent, as is the threat of critical systems being designed and manufactured overseas. To date, few tools or capabilities exist to prevent or even detect these classes of attacks. Programs, such as DARPA Trust, exist to identify...
The detection of cyber attacks before they are successful represents an essential stage in the evolution of an attack vector centric security framework. Anti-virus, Malware and Firewalls detection & protection ideologies are proving to be ineffective and they were never designed with multi-tenant cloud environments in mind. The current security solution development is driven by the complexity...
Phishing is a form of electronic deception in which an attacker tries to cause the recipient to do something or disclose data that they likely would not normally do by mimicking a trustworthy entity. These attacks have been increasing at an alarming rate and can cause damages in the form of identity theft, financial losses, and compromised security for organizations and governmental institutions....
A new model, called as PCA-LSSVM was investigated. The model is fit for company in the small sample space. It uses PCA to predigest the input vector and uses LSSVM to judge the statement of the company risk. With the model, one or more listed company could be selected in textile industry, and the defects in resolving early warning of the fnancial risk with traditional algorithm model could be omitted...
This paper discussed the concept of logical reasoning, analyzing how to cultivate image thought, abstract thought and inspirational thought as well in the course of analysis of security investment. Finally the writer draws a conclusion that the key to successful investment decision lies in the judgment and reasoning in the investment process, which is based on logical reasoning. It is proved by the...
In this paper, we investigate the employee's job satisfaction from the private enterprise LH Group Co., LTD., and explore the factors which influence the job satisfaction. This paper takes the staffs of LH Company as the studying object, which company is a large-scale private enterprise by the steel and iron production as the primarily business, and it is a representative example‥ By reviews the predecessors'...
The rise of the social web has brought a series of privacy concerns and threats. In particular, data leakage is a risk that affects the privacy of not only companies but individuals. Although there are tools that can prevent data losses, they require a prior step that involves the sensitive data to be properly identified. In this paper, we propose a new automatic approach that applies Named Entity...
The essay starts with expounding the principal contents of Service Theater Theory, and then makes an analysis of the results from "investigation questionnaire of Sichuan folk custom tourism" designed by the subject group, and further comes to the conclusion that the tourists pay more attention to the accommodations, the surrounding sanitary conditions and other assorting facilities of the...
Construction industry provides large number of employment and makes significant contribution to nation economy in China. But accidents at work happen almost every day. In addition to cost of human injury and death, the accidents are unduly expensive in terms of damage of property and in completion of project. HSE at the operational level strives to eliminate injuries, adverse health effects and damage...
Business policy reflects way too many things not only restricting what the company should do but also predicting the future direction of the company. It is desirable that the description of business policy can be interchangeable between business descriptions and engineering specifications so that the rules can be integrated into engineering process without further misinterpreting and conflicting....
Books and articles frequently exhort developers to build secure software by designing security in. A few large companies (most notably Microsoft) have completely reengineered their development process to include a focus on security. However, for all except the largest vendors, software security (or software assurance) is a relatively recent phenomenon, and one with an uncertain payoff. In this paper,...
User passwords are the gateway to an organization's assets. When users are the agents selecting passwords, they are the key component to improving passwords. Users must be persuaded to select passwords difficult to compromise. User behavior can be influenced by information security training. This study examines the use of cognitive load theory to design the information security training on password...
This article is quite different from other articles published in basic training; rather than focus on a specific security-related technology, I want to focus on another important topic: how to be more effective as a security person.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.