Accès libre

Information-Sharing Challenges and Issues in Multinational Operations, Part 1

   | 16 déc. 2020
À propos de cet article

Citez

Advenica. (2019). What is a data diode and how does it work? available at: https://www.advenica.com/en/blog/2019-02-19/what-is-a-data-diode-and-how-does-it-work.Search in Google Scholar

European Network and Information Security Agency. (2015). Definition of Cybersecurity, Gaps and overlaps in standardisation V1.0. Greece: Author.Search in Google Scholar

EUR-Lex Document 22003A0327(01). (2013). Agreement between the European Union and the North Atlantic Treaty Organization, available at: https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:22003A0327(01)&from=ENSearch in Google Scholar

Kassai, K. (2015). Elektronikus információbiztonsági alapismeretek a honvédelmi szervezetek által kezelt minősített adatok biztonsága érdekében, Hadmérnök, Vol. X, No. 1, 210-223.Search in Google Scholar

Koumartzis, N., & Veglis, A. (2011). Internet regulation: The need for more transparent Internet filtering systems and improved measurement of public opinion on Internet filtering. First Monday, Volume 16, Number 10, 1-17.10.5210/fm.v16i10.3266Search in Google Scholar

Lord, N. (2018). What is Advanced Threat Protection (ATP)?, Digital Guardian, available at: https://digitalguardian.com/blog/what-advanced-threat-protection-atp.Search in Google Scholar

Melnick, J. (2019). 10 Best Practices Essential for Your Data Loss Prevention (DLP) Policy, Netwrisk, available at: https://blog.netwrix.com/2019/07/16/10-best-practices-essential-for-your-data-loss-prevention-dlp-policy/.Search in Google Scholar

OPSWAT. (2020). Multiscanning, Advanced Threat Prevention with Simultaneous Anti-Malware Engines, available at: https://www.opswat.com/technologies/multiscanningSearch in Google Scholar

Rababah, B., Zhou, S., & Bader, M. (2018). Evaluation the Performance of DMZ. International Journal of Wireless and Microwave Technologies, 2018-1, Vol. 8, Issue 1, 1-13.Search in Google Scholar

RedHat. (2018). What is malware? available at: https://www.redhat.com/en/topics/security/what-is-malware.Search in Google Scholar

Vacca, J. (2009). Computer and Information Security Handbook. Burlington. USA: Elsevier.Search in Google Scholar

Verma, R., & Agrawal, S. (2013). Data security for any organization by using public key infrastructure components and MD5, RSA algorithms. International Journal of Research in Engineering and Technology (IJRET), Vol. 2, Issue 5.Search in Google Scholar