Empowering Information Security Managers: Tailored Information Security Policy Design with POLCO Software.
Elham RostamiPublished in: ISD (2023)
Keyphrases
- information security
- technical issues
- network security
- security requirements
- privacy concerns
- end users
- security level
- databases
- information systems
- user interface
- software architecture
- smart card
- security policies
- security risks
- data protection
- countermeasures
- design process
- intrusion detection
- computer systems
- access control
- data mining