当前位置: X-MOL 学术J. Inf. Technol. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Android-based Disease Identification on Crystal Guava's Leaf using Enterprise Unified Process Method
Journal of Information Technology ( IF 5.6 ) Pub Date : 2020-03-02 , DOI: 10.47292/joint.v2i1.001
Ari Kurniawan Sudiarto 1 , Khoirida Aelani 1 , Fresa Dwi Juniar 1
Affiliation  

Organizations and people that use computers can describe their needs for information security and trust in systems in terms of three major requirements which are confidentiality, integrity and availability. Payroll and general ledger were among the first processes to become automated. However, organizations have continuously experienced targeted attacks and on an increasingly frequent basis. Security risk is increasing due to increased internal and external threats. Subsequently, security is getting harder to manage. In this climate, organizations must employ strategies to direct their security efforts and should optimize their limited resources. The study endeared to analyze and evaluate security strategies utilized in the financial management systems with the sole aim of driving innovation and generating competitive advantage. The researcher utilized desktop literature review, this type of review critiques and summarizes a body of literature and draws conclusions about the topic in question. The study found that many organizations operate in large-scale network environments with numerous servers, fixed terminals and portable wireless devices including laptops and smart phones. In addition, there are employees with complex access profiles to masses of information at varying levels of sensitivity. The strategies focused on security risk management include prevention, deterrence, surveillance, detection, response, deception, perimeter defense and layering. Of importance is the loss prevention which focuses on what critical assets are and how they can be protected. Attacks can be prevented by employing these strategies and the improvement of system efficiency. The study recommended that strategies should be devised to contend with risk exposure in financial security environments which requires a systematic and comprehensive approach with a view to learning and developing situational awareness especially from security incidents. Keywords: Security, Strategy, Information system, Financial Management and Organization

中文翻译:

基于Android的水晶番石榴叶病害识别企业统一流程方法

使用计算机的组织和人员可以从机密性、完整性和可用性三个主要要求来描述他们对信息安全和系统信任的需求。工资单和总账是最早实现自动化的流程之一。然而,组织不断经历有针对性的攻击,并且越来越频繁。由于内部和外部威胁的增加,安全风险也在增加。随后,安全性变得越来越难以管理。在这种环境下,组织必须采用策略来指导其安全工作,并应优化其有限的资源。该研究旨在分析和评估财务管理系统中使用的安全策略,其唯一目的是推动创新和产生竞争优势。研究人员利用桌面文献综述,这种类型的综述批评和总结了大量文献,并就相关主题得出结论。研究发现,许多组织在拥有众多服务器、固定终端和便携式无线设备(包括笔记本电脑和智能手机)的大规模网络环境中运营。此外,有些员工对不同敏感程度的大量信息具有复杂的访问配置文件。专注于安全风险管理的策略包括预防、威慑、监视、检测、响应、欺骗、外围防御和分层。重要的是损失预防,它侧重于关键资产是什么以及如何保护它们。通过采用这些策略和提高系统效率,可以防止攻击。该研究建议应制定策略以应对金融安全环境中的风险敞口,这需要系统和全面的方法,以学习和发展态势感知,尤其是从安全事件中学习和发展态势感知。关键词:安全、战略、信息系统、财务管理和组织
更新日期:2020-03-02
down
wechat
bug