Using Security Attack Scenarios to Analyse Security During Information Systems Design.
Haralambos MouratidisPaolo GiorginiGordon A. MansonPublished in: ICEIS (3) (2004)
Keyphrases
- information systems
- information security
- attack scenarios
- computer security
- security requirements
- security management
- security policies
- countermeasures
- network security
- intrusion detection
- security issues
- security measures
- risk analysis
- key management
- security protocols
- critical infrastructure
- cyber attacks
- knowledge discovery
- data analysis