Compliance with standards, assurance and audit: does this equal security?
Bob DuncanMark WhittingtonPublished in: SIN (2014)
Keyphrases
- information security
- intrusion detection
- iso iec
- security issues
- network security
- information assurance
- international standard
- countermeasures
- anomaly detection
- information systems
- access control
- security requirements
- smart card
- security management
- security problems
- data protection
- metadata
- widely accepted
- security mechanisms
- security level
- neural network
- intrusion detection system
- security measures
- computer security
- functional requirements
- web services
- network management
- database
- security policies