From Security Culture to Effective E-Security Solutions.
Solange Ghernaouti-HeliePublished in: IICIS (2003)
Keyphrases
- security issues
- information security
- security requirements
- intrusion detection
- security systems
- security problems
- network security
- security policies
- information assurance
- security patterns
- security mechanisms
- security protocols
- security properties
- security level
- security management
- cyber security
- computer security
- access control
- high quality
- security vulnerabilities
- database
- buffer overflow
- security model
- data security
- statistical databases
- cost effective
- optimal solution
- neural network