Cyberspace security: How to develop a security strategy
Bel G. RaggadSahbi SidhomPublished in: CoRR (2007)
Keyphrases
- information security
- network security
- security issues
- security management
- security requirements
- access control
- security policies
- statistical databases
- security mechanisms
- security threats
- security problems
- functional requirements
- information assurance
- database
- security vulnerabilities
- cyber attacks
- security systems
- data security
- intrusion detection
- end users
- case study
- data sets
- real time