Managing vulnerabilities of information systems to security incidents.
Fariborz FarahmandShamkant B. NavathePhilip H. Enslow Jr.Gunter P. SharpPublished in: ICEC (2003)
Keyphrases
- information security
- information systems
- security issues
- information assurance
- security vulnerabilities
- security level
- countermeasures
- intrusion detection
- network security
- security requirements
- enterprise wide
- security mechanisms
- computer security
- security breaches
- information technology
- buffer overflow
- security risks
- smart card
- security patterns
- sensitive data
- smart grid
- security problems
- security flaws
- user authentication
- e government
- mission critical
- information processing systems
- computer networks
- information sharing
- health care
- computer systems
- web services