How many information security staff people should you have?
Charles Cresson WoodPublished in: Comput. Secur. (1990)
Keyphrases
- information security
- countermeasures
- security issues
- smart card
- network security
- computer security
- information systems
- intrusion detection
- smart grid
- security requirements
- risk assessment
- iso iec
- information security management
- sensitive data
- information assurance
- data security
- security level
- e government
- risk analysis
- critical infrastructure
- cyber defense
- security threats
- secret key
- data protection
- technical issues
- intrusion detection system
- data analysis
- case study