Information Security Governance control through comprehensive policy architectures.
Rossouw von SolmsKerry-Lynn ThomsonMvikeli ManinjwaPublished in: ISSA (2011)
Keyphrases
- information security
- information systems
- e government
- countermeasures
- security issues
- smart card
- intrusion detection
- information security management
- computer security
- security requirements
- network security
- information assurance
- security level
- cyber defense
- sensitive data
- iso iec
- senior management
- policy making
- smart grid
- control policy
- databases
- privacy concerns
- security risks
- information technology
- optimal policy
- control system
- public sector
- technical issues
- probabilistic model
- decision support system