The Threats that Insiders Pose to Critical Infrastructure – a South African Perspective
暂无分享,去创建一个
[1] E. Eugene Schultz. A framework for understanding and predicting insider attacks , 2002, Comput. Secur..
[2] Shari Lawrence Pfleeger,et al. Insiders Behaving Badly: Addressing Bad Actors and Their Actions , 2010, IEEE Transactions on Information Forensics and Security.
[3] Harri Oinas-Kukkonen,et al. A review of information security issues and respective research contributions , 2007, DATB.
[4] W. Caelli,et al. Information Security Handbook , 1991 .
[5] Rossouw von Solms,et al. A framework for the governance of information security , 2004, Comput. Secur..
[6] Evangelos A. Kiountouzis,et al. The insider threat to information systems and the effectiveness of ISO17799 , 2005, Comput. Secur..