A Formalized Approach to the Effective Selection and Evaluation of Information Security Control.
Lynette BarnardRossouw von SolmsPublished in: Comput. Secur. (2000)
Keyphrases
- information security
- security issues
- information systems
- countermeasures
- intrusion detection
- computer security
- information security management
- network security
- user authentication
- smart card
- technical issues
- cyber defense
- machine learning
- design theory
- critical infrastructure
- smart grid
- quality evaluation
- risk assessment
- e government
- supervised learning
- security level
- security threats
- management practices
- data warehouse
- information assurance
- control system