Dramatic changes in the information security risk landscape over several decades have not yet been matched by similar changes in organizational information security which is still mainly based on a mindset that security is achieved through extensive preventive controls. As a result, maintenance cost of information security is increasing rapidly, but this increased expenditure has not really made an attack more difficult. The opposite seems to be true, information security attacks have become easier to perpetrate and appear more like information warfare tactics. At the same time, the damage caused by a successful attack has increased significantly and may sometimes become critical to an organization. In this paper we evaluate one particular ...
PhD (Computer Sciences), North-West University, Potchefstroom Campus, 2016Information security has b...
Investments to protect against known vulnerabilities are necessary but not sufficient to assure a fi...
An advanced persistent threat (APT) is a prolonged, aimed attack on a specific target. Cyber attacke...
Dramatic changes in the information security risk landscape over several decades have not yet been m...
The paper uses a game-theoretic setting to examine the interaction between strategic attackers who t...
Organizations invest heavily in technical controls for their Information Assurance (IA) infrastructu...
Information security is tasked with protecting the confidentiality, integrity, and availability of a...
Understanding and managing information infrastructure (II) security risks is a priority to most orga...
Information systems security is a challenging research area in the context of Information Systems. I...
The level of firms\u27 information security investment has recently become a critical issue in the m...
Information security threats to organisations have changed during the last decade, due to the comple...
Electronic commerce and Internet have enabled businesses to reduce costs, attain greater market reac...
An organization that works with any information must have a security system capable of protecting th...
© 2018 Craig Andrew HorneThe research topic under investigation in this thesis is information securi...
A firm can build more effective security strategies by identifying and ranking the severity of poten...
PhD (Computer Sciences), North-West University, Potchefstroom Campus, 2016Information security has b...
Investments to protect against known vulnerabilities are necessary but not sufficient to assure a fi...
An advanced persistent threat (APT) is a prolonged, aimed attack on a specific target. Cyber attacke...
Dramatic changes in the information security risk landscape over several decades have not yet been m...
The paper uses a game-theoretic setting to examine the interaction between strategic attackers who t...
Organizations invest heavily in technical controls for their Information Assurance (IA) infrastructu...
Information security is tasked with protecting the confidentiality, integrity, and availability of a...
Understanding and managing information infrastructure (II) security risks is a priority to most orga...
Information systems security is a challenging research area in the context of Information Systems. I...
The level of firms\u27 information security investment has recently become a critical issue in the m...
Information security threats to organisations have changed during the last decade, due to the comple...
Electronic commerce and Internet have enabled businesses to reduce costs, attain greater market reac...
An organization that works with any information must have a security system capable of protecting th...
© 2018 Craig Andrew HorneThe research topic under investigation in this thesis is information securi...
A firm can build more effective security strategies by identifying and ranking the severity of poten...
PhD (Computer Sciences), North-West University, Potchefstroom Campus, 2016Information security has b...
Investments to protect against known vulnerabilities are necessary but not sufficient to assure a fi...
An advanced persistent threat (APT) is a prolonged, aimed attack on a specific target. Cyber attacke...