Selection the perimeter protection equipment in security systems

@article{Tun2018SelectionTP,
  title={Selection the perimeter protection equipment in security systems},
  author={Hein Tun and Sergey Lupin and Htun Htun Linn and Kyaw Zaw Lin},
  journal={2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus)},
  year={2018},
  pages={1504-1508}
}
Information systems are being developed rapidly nowadays. The biggest challenge for all organizations is to find the best way to protect important information of an organization. So, information systems security has become an important area of concern for all organizations. Materials which presented in this paper are a review of the technical characteristics of physical systems security equipment, the standards supported and also administrative regulations of information systems security. The… CONTINUE READING

References

Publications referenced by this paper.
SHOWING 1-10 OF 17 REFERENCES

Systems of Physical Protection (Basic of Theory)

V. V. Volhonsky
  • (in Russian), . . , ( ),
  • 2017
VIEW 11 EXCERPTS
HIGHLY INFLUENTIAL

Protection Means of Computer Systems and Networks

T. A. Markina
  • (in Russian) ,
  • 2016
VIEW 11 EXCERPTS
HIGHLY INFLUENTIAL

CISSP All-in-One Exam Guide

VIEW 3 EXCERPTS
HIGHLY INFLUENTIAL

Probabilistic and deterministic analysis the security of information systems

  • 2017 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus)
  • 2017
VIEW 1 EXCERPT

Sarah A

J. Stephan
  • Abdullah, Rajaa D. Resan, “Biometric Systems Application Note US Department of Home Land Security”, In Proc. 2015 Annual Conference on New Trends in Information & Communications Technology Applications
  • 2017
VIEW 1 EXCERPT

, and Shrikant B . Ardhapurkar , " Cyber Security Analysis using Vulnerability Assessment and Penetration Testing "

Prashant S. Shinde
  • " The Research of The Information Security Base on The Intergrated Carrying Platform " , in Proc . 2016 6 th International Conference on Electronics Information and Emergency Communication ( ICEIEC )
  • 2016

A

S. Kumar, S. A. Yadav, S. Sharma
  • Singh, "Recommendations for Effective Cyber Security Execution," in Proc. 2016 1st International Conference on Innovation and Challenges in Cyber Security
  • 2016

Ardhapurkar, "Cyber Security Analysis using Vulnerability Assessment and Penetration Testing

Prashant S. Shinde, B Shrikant
  • Proc. 2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (WCFTR’16),
  • 2016
VIEW 1 EXCERPT

Comparing Detection Capabilities of AntiVirus Products: An Empirical Study with Different Versions of Products from the Same Vendors

  • 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W)
  • 2016

Similar Papers

Loading similar papers…