A Proactive Procedure to Mitigate the BYOD Risks on the Security of an Information System.
Rakesh KumarHardeep SinghPublished in: ACM SIGSOFT Softw. Eng. Notes (2015)
Keyphrases
- information systems
- information security
- risk analysis
- risk assessment
- network security
- security issues
- security requirements
- intrusion detection
- security risks
- security analysis
- security threats
- security problems
- statistical databases
- access control
- computer security
- information assurance
- data security
- cyber security
- iterative procedure
- security mechanisms
- sensitive data
- security systems
- security level
- risk management
- health care
- computer systems
- neural network