Information Security: Auditing the Behaviour of the Employee.
Cheryl VroomRossouw von SolmsPublished in: SEC (2003)
Keyphrases
- information security
- countermeasures
- smart card
- information systems
- intrusion detection
- computer security
- information security management
- security issues
- security requirements
- network security
- security level
- smart grid
- sensitive data
- iso iec
- critical infrastructure
- data security
- cyber defense
- risk assessment
- risk analysis
- e government
- information assurance
- privacy concerns
- design theory
- statistical databases
- computer systems
- text classification
- user authentication
- management practices
- software engineering
- metadata