An Access Control and Positioning Security Management System Based on RFID

Author(s):  
Anchan Mai ◽  
Zongtian Wei ◽  
Mengji Gao
Author(s):  
Nataliia Tsymbalenko

The subject of research-theoretical concepts of economic security managementof universities. The purpose of the article. The study of the essence of the economicsecurity management system of the university and the definition of its main tasks,the formulation of principles of economic security management of the university.Methodology. The dialectical method, methods of analysis and synthesis, methodsof structural-logical and semantic analysis were used to study and summarizescientific papers on the research topic. The results of the work. The essence of theuniversity’s economic security management system has been reviewed. The maintasks of the control system have been identified. A definition of the university’seconomic security system has been proposed. Principles of management of economicsecurity of the university have been formulated. These are: scientific andorganizational and social principles. Conclusions. The proposed principles allow totake into account the economic role and social mission of universities in managingeconomic security.


2013 ◽  
Vol 18 (4) ◽  
pp. 343-395 ◽  
Author(s):  
Kristian Beckers ◽  
Isabelle Côté ◽  
Stephan Faßbender ◽  
Maritta Heisel ◽  
Stefan Hofbauer

2016 ◽  
Vol 6 (1) ◽  
pp. 38
Author(s):  
Yuni Cintia Yuze ◽  
Yudi Priyadi ◽  
Candiwan .

The importance of information and the possible risk of disruption, therefore the universities need to designed and implemented of the information security.  One of the standards that can be used to analyze the level of information security in the organization is ISO/IEC 27001 : 2013 and this standard has been prepared to provide requirements for establishing, implementing, maintaining and continually improving an information security management system. The objective of this research is to measure the level of information security based on standard ISO/IEC 27001: 2013 and modeling systems for information security management. This research uses descriptive qualitative approach, data collection and validation techniques with tringulasi (interview, observation and documentation). Data was analyzed using gap analysis and to measure the level of maturity this research uses SSE-CMM (Systems Security Engineering Capability Maturity Model). Based on the research results, Maturity level clause Information Security Policy reaches level 1 (Performed-Informally), clause Asset Management reaches level 3 (Well-Defined), clause Access Control reaches level 3 (Well-Defined), clause Physical and Environmental Security reaches level 3 (Well-Defined), clause Operational Security reaches level 3 (Well-Defined), Communication Security clause reaches the level 2 (Planned and Tracked). Based on the results of maturity level discovery of some weakness in asset management in implementing the policy. Therefore, the modeling system using the flow map and CD / DFD focused on Asset Management System.


Sign in / Sign up

Export Citation Format

Share Document