Login / Signup
Information Security: Auditing the Behaviour of the Employee.
Cheryl Vroom
Rossouw von Solms
Published in:
SEC (2003)
Keyphrases
</>
information security
countermeasures
smart card
information systems
intrusion detection
computer security
information security management
security issues
security requirements
network security
security level
smart grid
sensitive data
iso iec
critical infrastructure
data security
cyber defense
risk assessment
risk analysis
e government
information assurance
privacy concerns
design theory
statistical databases
computer systems
text classification
user authentication
management practices
software engineering
metadata