Information security governance and how to accomplish it.
Mario SajkoNikola HadjinaIvan SedinicPublished in: MIPRO (2011)
Keyphrases
- information security
- information systems
- e government
- countermeasures
- security issues
- intrusion detection
- senior management
- information technology
- smart card
- network security
- computer security
- security requirements
- information security management
- risk assessment
- public sector
- security level
- sensitive data
- smart grid
- technical issues
- cyber defense
- information assurance
- iso iec
- data security
- design theory
- case study
- data analysis
- software engineering
- risk analysis
- privacy preserving
- privacy concerns