GoSafe: On the practical characterization of the overall security posture of an organization information system using smart auditing and ranking
暂无分享,去创建一个
Jamal N. Al-Karaki | Amjad Gawanmeh | Sanaa El-Yassami | J. Al-Karaki | A. Gawanmeh | Sanaa El-Yassami
[1] Timothy P. Layton. Information security - design, implementation, measurement, and compliance , 2006 .
[2] Vladimir Stantchev,et al. Security Management Standards: A Mapping , 2016 .
[3] Knut Blind,et al. Exploring the Adoption of the International Information Security Management System Standard ISO/IEC 27001: A Web Mining-Based Analysis , 2021, IEEE Transactions on Engineering Management.
[4] Isabelle Comyn-Wattiau,et al. Reusable knowledge in security requirements engineering: a systematic mapping study , 2015, Requirements Engineering.
[5] Izak Benbasat,et al. Institutional pressures in security management: Direct and indirect influences on organizational investment in information security control resources , 2015, Inf. Manag..
[6] Vladimir Stantchev,et al. Governance of Cloud Computing Services for the Life Sciences , 2014, IT Professional.
[7] Solange Ghernaouti,et al. Cybersecurity Capacity Building: A Swiss Approach , 2018 .
[8] Annie I. Antón,et al. A requirements taxonomy for reducing Web site privacy vulnerabilities , 2004, Requirements Engineering.
[9] Maritta Heisel,et al. A comparison of security requirements engineering methods , 2010, Requirements Engineering.
[10] Thomas Peltier. Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management , 2001 .
[11] A. Noah,et al. Risk governance and cybercrime: the hierarchical regression approach , 2020, Future Business Journal.
[12] Olga Gadyatskaya,et al. Bridging Two Worlds: Reconciling Practical Risk Assessment Methodologies with Theory of Attack Trees , 2016, GraMSec@CSF.
[13] Sebastian Pape,et al. LiSRA: Lightweight Security Risk Assessment for decision support in information security , 2020, Comput. Secur..
[14] Madiha Shah,et al. Impact of Management Information Systems (MIS) on School Administration: What the Literature Says☆ , 2014 .
[15] Susan P. Williams,et al. Information security governance practices in critical infrastructure organizations: A socio-technical and institutional logic perspective , 2013, Electronic Markets.