Identifying Vulnerabilities of Advanced Persistent Threats: An Organizational Perspective.
Mathew NichoShafaq KhanPublished in: Int. J. Inf. Secur. Priv. (2014)
Keyphrases
- information security
- countermeasures
- security vulnerabilities
- information systems
- security issues
- security risks
- viewpoint
- security breaches
- buffer overflow
- decision making
- data corruption
- network security
- denial of service attacks
- systems development
- intrusion detection
- information technology
- web intelligence
- knowledge sharing
- web applications
- security requirements
- computer security
- end user computing
- data mining
- smart card