Identifying Critical Components During Information Security Evaluations.
Andrew RaeColin J. FidgePublished in: J. Res. Pract. Inf. Technol. (2005)
Keyphrases
- information security
- countermeasures
- security issues
- intrusion detection
- computer security
- security requirements
- information systems
- network security
- cyber defense
- smart card
- information security management
- risk assessment
- smart grid
- e government
- information assurance
- security risks
- databases
- iso iec
- data security
- cyber security
- risk analysis
- technical issues
- design theory
- user authentication
- security level
- security management
- sensitive data
- privacy concerns
- data mining
- database