메뉴 건너뛰기




Volumn 50, Issue , 2003, Pages 348-354

Managing vulnerabilities of information systems to security incidents

Author keywords

[No Author keywords available]

Indexed keywords

INFORMATION SECURITY; PROBABILISTIC EVALUATION; REAL WORLD DATA; RISK MANAGEMENT SYSTEMS; SECURITY INCIDENT; SECURITY THREATS; SENIOR MANAGEMENT; THREE-AXIS; VULNERABILITY ASSESSMENTS;

EID: 77954468090     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/948005.948050     Document Type: Conference Paper
Times cited : (18)

References (13)
  • 1
    • 77954521591 scopus 로고    scopus 로고
    • BS 7799, British Standards
    • British Security Standard, BS 7799, British Standards, 1999.
    • (1999) British Security Standard
  • 7
    • 0005001185 scopus 로고    scopus 로고
    • Probabilistic Modeling of Terrorist Attacks: A System Analysis Approach to Setting Priorities among Countermeasures
    • October
    • Pate-Cornell, E., and Guikema, S., Probabilistic Modeling of Terrorist Attacks: A System Analysis Approach to Setting Priorities Among Countermeasures, Military Operation Research, October 2002.
    • (2002) Military Operation Research
    • Pate-Cornell, E.1    Guikema, S.2
  • 10
    • 0001133137 scopus 로고    scopus 로고
    • Coping with Systems Risk: Security Planning Models for Management Decision Making
    • Starub, D. W., and Welke, R. J., Coping with Systems Risk: Security Planning Models for Management Decision Making, MIS Quarterly, Vol. 23, No. 4, 441-469.
    • MIS Quarterly , vol.23 , Issue.4 , pp. 441-469
    • Starub, D.W.1    Welke, R.J.2
  • 11
    • 12244283592 scopus 로고    scopus 로고
    • Security Metrics Guide for Information Technology Systems
    • Swanson, M. et al, Security Metrics Guide for Information Technology Systems, NIST Special Publications 800-55, 2002.
    • (2002) NIST Special Publications 800-55
    • Swanson, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.