In a 'trusting' environment, everyone is responsible for information security.
Patricia A. H. WilliamsPublished in: Inf. Secur. Tech. Rep. (2008)
Keyphrases
- information security
- countermeasures
- security issues
- information systems
- intrusion detection
- information security management
- smart card
- cyber defense
- computer security
- network security
- security requirements
- mobile robot
- sensitive data
- critical infrastructure
- information assurance
- data security
- databases
- smart grid
- iso iec
- anomaly detection
- case study
- security risks
- real world