Enterprise security investment through time when facing different types of vulnerabilities.
Yosra MiaouiNoureddine BoudrigaPublished in: Inf. Syst. Frontiers (2019)
Keyphrases
- information security
- security vulnerabilities
- security issues
- security management
- security mechanisms
- security risks
- enterprise network
- information security management
- intrusion detection
- network security
- information management
- decision making
- security systems
- enterprise systems
- security patterns
- buffer overflow
- security breaches
- security requirements
- rfid tags
- security policies
- formal model
- smart card
- network management
- cost benefit
- access control