Analysis of cyber security risk management documents
نویسندگان
چکیده
منابع مشابه
Integrating Shared Cyber Security Information into Information Security Risk Management
In the last couples of years, the complexity and interconnectedness of Information Systems (IS), and security related incidents increased significantly. In order to guarantee confidentiality, integrity, and availability of these IS an appropriate information security risk management (ISRM) must be in place. Reliable ISRM represents a challenge for organizations, since they take security related...
متن کاملlangauge needs analysis of undergraduate business management and economics students
the aim of conducting this study was to investigate the foreign language learning needs of undergraduate economics students and business management students in faculties of social sciences of alzahra and azad naragh university. in the study, which was designed on the basis of a qualitative-quantitative basis using interviews and questionnaires, 146 female undergraduate business management as we...
15 صفحه اولBeyond the Castle Model of cyber-risk and cyber-security
Article history: Received 13 July 2015 Received in revised form 27 January 2016 Accepted 29 January 2016 Available online xxxx The predominant metaphor for secure computing today is modeled on ever higher, ever better layers of walls. This article explains why that approach is as outmoded for cyber security today as it became for physical security centuries ago. Three forces are undermining the...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Collection "Information technology and security"
سال: 2017
ISSN: 2518-1033,2411-1031
DOI: 10.20535/2411-1031.2017.5.1.120580