12 research outputs found

    Reliability and Security - Convergence or Divergence

    Get PDF
    Reliability, as every technical field, must adapt to the new demands imposed by reality. Started initially as a field designed to control and ensure the smooth functionality of an element or technical system, reliability has reached the stage where the discussion is about the reliability management, similar to the other top-level fields. Security has its own contribution to the reliability of a system; a reliable system is a system with reliable security. In order for a system to be reliable, that means clear and safe, all its components must be reliable. In the following pages we will talk about the two main facts - reliability and security - to determine both the convergence and the divergence points.Reliability, Security, Failure, Threat, Redundancy, Costs, Investment

    AUTOCHTHONOUS APPROACHING IN THE MANAGEMENT OF THE SECURITY RISK

    Get PDF
    An optimal management for a corporation, no matter what size the corporation is, it must contain the management of the security risk. On the importance that is given to the risk management can depend the well functioning of the corporation. An important role in this process has the owner of the business and the way that this one understands the risk. A good understanding of the risk by the owner will have as effect the allocation of sufficient funds to implement controls meant to bring the risk level in order to be an acceptable one. The autochthonous corporations, in a great part even because of the inexistence of reglementations in this domain, have an empiric approach of the phenomena.approaching, autochthonous, controls, resource owner, risk, risk analysis, risk level, risk management, security, vulnerability

    The Network’s Data Security Risk Analysis

    Get PDF
    Establishing the networks security risk can be a very difficult operation especially for the small companies which, from financial reasons can’t appeal at specialist in this domain, or for the medium or large companies that don’t have experience. The following method proposes not to use complex financial calculus to determine the loss level and the value of impact making the determination of risk level a lot easier.controls, risk analysis, risk level, risk management, impact, network, probability, vulnerability level.

    Data Warehouse And Data Mining – Neccessity Or Useless Investment

    Get PDF
    The organization has optimized databases which are used in current operations and also used as a part of decision support. What is the next step? Data Warehouses and Data Mining are indispensable and inseparable parts for modern organization. Organizations will create data warehouses in order for them to be used by business executives to take important decisions. And as data volume is very large, and a simple filtration of data is not enough in taking decisions, Data Mining techniques will be called on. What must an organization do to implement a Data Warehouse and a Data Mining? Is this investment profitable (especially in the conditions of economic crisis)? In the followings we will try to answer these questions.database, data warehouse, data mining, decision, implementing, investment

    AUTOCHTHONOUS APPROACHING IN THE MANAGEMENT OF THE SECURITY RISK

    Get PDF
    An optimal management for a corporation, no matter what size the corporation is, it must contain the management of the security risk. On the importance that is given to the risk management can depend the well functioning of the corporation. An important role in this process has the owner of the business and the way that this one understands the risk. A good understanding of the risk by the owner will have as effect the allocation of sufficient funds to implement controls meant to bring the risk level in order to be an acceptable one. The autochthonous corporations, in a great part even because of the inexistence of reglementations in this domain, have an empiric approach of the phenomena

    Reliability and Security - Convergence or Divergence

    Get PDF
    Reliability, as every technical field, must adapt to the new demands imposed by reality. Started initially as a field designed to control and ensure the smooth functionality of an element or technical system, reliability has reached the stage where the discussion is about the reliability management, similar to the other top-level fields. Security has its own contribution to the reliability of a system; a reliable system is a system with reliable security. In order for a system to be reliable, that means clear and safe, all its components must be reliable. In the following pages we will talk about the two main facts - reliability and security - to determine both the convergence and the divergence points

    Network security risk level

    Get PDF
    The advantages of the existence of a computers network within any company with pretensions are obvious. But the construction and the existence of a network without meeting some minimum security requirements, although it would be preferable to be optimal, can lead to bad functioning in the performance of the company’s business. The vulnerability of a grouping, such as a network, is given by the weakest point in its competence. The establishing of the risk level of each component of the network, and implicitly of the grouping, is highly necessaryassets, consequence, exposure factor, exposure level, risk analysis, impact rate, impact value, likelihood of occurrence, risk level

    The Network's Data Security Risk Analysis

    Get PDF
    Establishing the networks security risk can be a very difficult operation especially for the small companies which, from financial reasons can't appeal at specialist in this domain, or for the medium or large companies that don't have experience. The following method proposes not to use complex financial calculus to determine the loss level and the value of impact making the determination of risk level a lot easier

    Decision Assistance in Risk Assessment – Monte Carlo Simulations

    Get PDF
    High security must be a primary and permanent concern of the leadership of an organization and it must be ensured at any time. For this, a risk analysis is compulsory and imperative to be done during the risk management cycle. Security risk analysis and security risk management components mostly use estimative data during the whole extensive process. The further evolution of the events might not be reflected in the obtained results. If we were to think about the fact that hazard must be modeled, this concern is absolutely normal. Though, we must find a way to model the events that a company is exposed to, events that damage the informational security. In the following lines of this paper we will use the Monte-Carlo method in order to model a set of security parameters that are used in security risk analysis. The frequency of unwanted events, damages and their impact will represent our main focus and will be applied to both the quantitative and qualitative security risk analysis approach. The obtained results will act as a guide for experts to better allocation of resources for decreasing or eliminating the risk and will also represent a warning for the leadership about certain absolutely necessary investments

    DATA WAREHOUSES SECURITY IMPLEMENTATION

    No full text
    Data warehouses were initially implemented and developed by the big firms and they were used for working out the managerial problems and for making decisions. Later on, because of the economic tendencies and of the technological progress, the data wareho
    corecore