Corporate Security: An Australian Ostrich.
H. JamesRoger A. ColdwellPublished in: Inf. Manag. Comput. Secur. (1993)
Keyphrases
- information security
- security issues
- case study
- functional requirements
- access control
- information assurance
- network security
- intrusion detection
- statistical databases
- security requirements
- knowledge management
- data sets
- computer security
- security policies
- security measures
- security management
- key management
- cyber attacks
- user authentication
- security level
- security problems
- end user computing
- data integrity
- security vulnerabilities
- risk analysis