Monitoring the Effectiveness of Security Countermeasures in a Security Risk Management Model.
Neila RjaibiLatifa Ben Arfa RabaiPublished in: CSOC (2) (2015)
Keyphrases
- information security
- risk assessment
- countermeasures
- security model
- risk management
- risk analysis
- information security management
- security requirements
- security measures
- java card
- security breaches
- key management
- data warehouse
- smart grid
- project management
- elliptic curve
- access control
- decision support system
- open source
- e learning