Explore chapters and articles related to this topic
Asset Management
Published in Rajkumar Banoth, Narsimha Gugulothu, Aruna Kranthi Godishala, A Comprehensive Guide to Information Security Management and Audit, 2023
Rajkumar Banoth, Narsimha Gugulothu, Aruna Kranthi Godishala
Since ISO 27001 focuses on the preservation of confidentiality, integrity, and availability of information, this means that assets can be:Hardware: e.g. not only laptops, servers, printers but also mobile phones or USB memory sticks.Software: not only the purchased software but also freeware.Information: not only in electronic media (databases, files in PDF, Word, Excel, and other formats) but also in paper and other forms.Infrastructure: e.g. offices, electricity, air conditioning – because those assets can cause a lack of availability of information. People are also considered assets because they also have lots of information in their heads, which is very often not available in other forms.Outsourced services: e.g. not only legal services or cleaning services but also online services like Dropbox or Gmail – it is true that these are not assets in the pure sense of the word, but such services need to be controlled very similarly to assets, so they are very often included in the asset management.
Importance of providing Incentives and economic Solutions in It Security
Published in Brij B. Gupta, Michael Sheng, Machine Learning for Computer and Cyber Security, 2019
In [18], researchers showed evidence that if a security breach hinders confidentiality of the firm, then the market has a considerable negative reaction towards the suffering firm and it definitely affects the economic performance of the firm in future. But this survey holds many limitations too. Another author Riordan, in [19], studied providing economic incentives solutions in the presence of network externalities. Similarly, in the same direction, authors [20] studied that investment in security depends on other agents present in the network. They first developed an interdependent security (IDS) model for airlines system and then applied the same model for cyber security, fire protection and many other applications. Every node on one network makes investment in security against external attacks, but not from internal viruses that could easily compromise the system and make it a source of the attack for other networks. In [21], authors have shown how user’s incentives affect network security when the patching cost is high and negative externalities influence network security. They have shown that for a proprietary software patching rebate (users are compensated by vendors for actually patching the vulnerability) and self-patching are dominating while for freeware software’s self-patching is strictly needed. In [22], the authors proposed a model for examining the optimal decision for vulnerability disclosure under negative market externalities.
Nonfunctional Testing
Published in William E. Lewis, David Dobbs, Gunasekaran Veerapillai, Software Testing and Continuous Quality Improvement, 2017
William E. Lewis, David Dobbs, Gunasekaran Veerapillai
All organizations are at risk of “contracting” computer viruses, Trojans, and worms if they are connected to the Internet, use removable media (e.g., floppy disks and CD-ROMs), or use shareware/freeware software. With any malicious code, there is also the risk of compromising or losing sensitive or confidential information. To detect viruses, anti-virus software needs to be installed on network and machines. This antivirus software should have an up-to-date virus identification database (sometimes called virus signatures) that allows it to recognize all viruses. To detect viruses, the anti-virus software compares file contents with the known computer virus signatures, identifies infected files, quarantines and repairs them if possible, or deletes them if not. More sophisticated programs also look for viruslike activity in an attempt to identify new or mutated viruses that would not be recognized by the current virus detection database.
The CoDIS Taxonomy for Brain-Computer Interface Games Controlled by Electroencephalography
Published in International Journal of Human–Computer Interaction, 2023
Gabriel Alves Mendes Vasiljevic, Leonardo Cunha de Miranda
The distribution dimension is related to how the game is distributed to the players. Free games are available at no cost for the players, and can be further divided into Freeware and Open-Source games, the difference being that the latter also has its source-code available for players and other developers. Commercial games must be purchased to be played, i.e., they belong to the developer or a company and is sold as a product for profit. Examples of commercial BCI games are the ones available at the NeuroSky online store, which are compatible with the NeuroSky devices. Proprietary games are available only to its developers and/or owners. This include games developed to be used in scientific research that are not available for the public, or commercial games no longer available for purchasing, and can only be acquired by contacting the owner/developer.
Precise image fusion standardization for separated modalities using dedicated multimodal heart phantom
Published in The Imaging Science Journal, 2019
The aim of this study was to show the usefulness of dedicated MHP for standardization of diagnostic images obtained from different modalities. Three scanners (four modalities) were tested: SPECT/CT (hybrid), PET/CT (hybrid), MRI. Simulations of typical clinical cases (normal perfusion, myocardial ischemia and intestines artefacts) were performed. Obtained results were prepared using commercial and freeware available software. Then images were imposed. Fusion process was done using Amide (Amide a Medical Imaging Data Examiner) as well as commercial software produced by Philips (Philips DICOM Viewer). For normal perfusion simulation (Figures 3 and 6), in each of three sections (transverse, sagittal, frontal), the image superposition performed using freeware software gave results comparable with those obtained using commercial one. Therefore, even if software available in used modality has not got implemented fusion functionality, freeware one can be used.
A study on the efficacy of modal acoustic emission technique for health monitoring of structures with different geometries
Published in Nondestructive Testing and Evaluation, 2023
Parikshit Roy, Aloke Kumar Datta, Pijush Topdar
In the present study, the group velocities of rectangular aluminium plate and model steel truss are calculated using Dispersion Calculator (DC) [54] software. The software is available on the German Aerospace Centre homepage as a freeware stand-alone software and is comparable to popular software in this field such as DISPERSE [55]. The DC software is a MATLAB-based software for the computation of dispersion curves of guided waves in isotropic plates and multi-layered anisotropic composites. DC provides spreadsheets of calculated group velocities of Lamb waves with respect to frequency in a plate-like structure. Therefore, the group velocity of a Lamb mode for a certain frequency can be calculated from the available results.