Ontological Mapping of Information Security Best-Practice Guidelines.
Stefan FenzThomas PrucknerArman ManutscheriPublished in: BIS (2009)
Keyphrases
- information security
- countermeasures
- security issues
- intrusion detection
- information systems
- information security management
- network security
- smart card
- computer security
- security level
- cyber defense
- iso iec
- security requirements
- information assurance
- sensitive data
- risk assessment
- critical infrastructure
- e government
- real world
- anomaly detection
- technical issues
- risk analysis
- data security
- design theory
- expert systems