The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Information Security Professionals must be flexible and adapt to an ever changing environment. The financial industry in particular offers many unique challenges for information security as technology is often quickly adopted and governments regulations fluctuate and change. These challenges can be especially complicated during financial crises. In order for both information security professionals...
This paper discusses rationalizing governance, engineering practice, and engineering economics to produce conformant systems that meet their quality attribute targets for system and software assurance in an optimal, cost-effective fashion. It begins with a description of the governance landscape and addresses defining and trading off system quality characteristics, models for assessing the cost and...
In recent years critical infrastructures have witnessed rapid developments in the way their services are being implemented and delivered to consumers; this was instigated by the adaptation of the latest technologies in IT. An example of such an infrastructure is smart metering in the energy sector. Despite the evident advantages of such transformation, this lead to the emergence of new challenges...
Most organizations underestimate the demand for digital evidence [1]. Often, when evidence is required to prove fraudulent transactions, not enough or trustworthy evidence is available to link the attacker to the incident. It is essential for organizations to prepare themselves for digital Forensic (DF) investigations and ensure that entire organizational operating environment is prepared for example...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.