2012 IEEE International Conference on Green Computing and Communications 2012
DOI: 10.1109/greencom.2012.25
|View full text |Cite
|
Sign up to set email alerts
|

Global Network Security: A Vulnerability Assessment of Seven Popular Outsourcing Countries

Abstract: With increasingly more businesses engaging in offshore outsourcing, organisations need to be made aware of the global differences in network security, before entrusting a nation with sensitive information. In July 2011, Syn and Nackrst1 explored this topic by analysing seven countries from a wide spectrum across the globe for network security vulnerabilities. The countries selected were China,

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2015
2015
2018
2018

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 5 publications
0
1
0
Order By: Relevance
“…Exploratory comparative x case analysis 7 (Haynes, 2000) Article Qualitative Comparative case analysis x 7 (Hoti & McAleer, 2005) CH Apply Risk Assessment model to x x evaluate security of 120 countries 8 (Singha, Bellerby, & Trieschmann, 2012) Article Sensitivity analysis of oil spill. x 8 (Middleton, Glosec Ltd., Day, & Lallie, 2012) Article Use Nmap and Nessus to test network x vulnerabilities in offshore In 7 countries. 8 (Crook, 2010) Article Magazine article x 9 (Giroux, 2010) Article Risk Analysis on Natural and x Human-caused Threats 9 (Ibrahim & Allen, 2012) Article Qualitative, interpretative methodology x x with Activity Theory as a conceptual framework 9 (Gregory, 2011) Article Qualitative literature review with a x x comparative approach for three borderlands 9 (Fabiano, 2012) CH Analysis on International Threats x x 9 (Haimes & Yacob, 2011) Article Multidimensional Risk Analysis x on Terrorism 14 Number corresponding to database 15 Pages: 4,164,307,311,323.…”
Section: As Shown Inmentioning
confidence: 99%
“…Exploratory comparative x case analysis 7 (Haynes, 2000) Article Qualitative Comparative case analysis x 7 (Hoti & McAleer, 2005) CH Apply Risk Assessment model to x x evaluate security of 120 countries 8 (Singha, Bellerby, & Trieschmann, 2012) Article Sensitivity analysis of oil spill. x 8 (Middleton, Glosec Ltd., Day, & Lallie, 2012) Article Use Nmap and Nessus to test network x vulnerabilities in offshore In 7 countries. 8 (Crook, 2010) Article Magazine article x 9 (Giroux, 2010) Article Risk Analysis on Natural and x Human-caused Threats 9 (Ibrahim & Allen, 2012) Article Qualitative, interpretative methodology x x with Activity Theory as a conceptual framework 9 (Gregory, 2011) Article Qualitative literature review with a x x comparative approach for three borderlands 9 (Fabiano, 2012) CH Analysis on International Threats x x 9 (Haimes & Yacob, 2011) Article Multidimensional Risk Analysis x on Terrorism 14 Number corresponding to database 15 Pages: 4,164,307,311,323.…”
Section: As Shown Inmentioning
confidence: 99%