Showing 1 - 10 of 44
order to improve and maintain the security of the Information System (IS, hereafter), there is need to build risk analysis … threats based on an existing designed security ontology. To validate the feasibility of the approach a case study on e …
Persistent link: https://www.econbiz.de/10012048074
state of the art of information security, the importantissues confronting managers, security enforcement measure … a scheme for probabilistic evaluation of the impact of security threatswith some illustrative examples. It involves … arisk management system for information systems security incidents in five stages: 1-Resource and application value analysis …
Persistent link: https://www.econbiz.de/10009475778
Persistent link: https://www.econbiz.de/10003357439
Persistent link: https://www.econbiz.de/10003419427
Persistent link: https://www.econbiz.de/10009500442
Persistent link: https://www.econbiz.de/10009751046
Persistent link: https://www.econbiz.de/10010246680
Persistent link: https://www.econbiz.de/10010338342
Persistent link: https://www.econbiz.de/10010350170
Persistent link: https://www.econbiz.de/10009297296