The aim of this research paper is to analyse the individual and collective information security risks which could arise from using a security strategy model (SSM); the objective of creating the SSM was so as to protect a wireless local area network (WLAN). As such the focus of this paper shall be on the individual operational components used to create the SSM and the information security risks which stem from their being part of the SSM. In order to review the components of the SSM the paper shall use the BS ISO/IEC 17799:2005 which is the British Standard, International Standard and also the European Standard for using Information Communication Technology (ICT) correctly in order to effectively mitigate against the exposure of an organizat...
This paper presents the outcome of an engineering study as part of the design and development of a l...
The process of validating the correct operation of software is difficult for a variety of reasons. T...
AS/NZS4360:2004 suggests that the risk assessment process should not be conducted or information gat...
The term security assurance has been used in the computer science literature to express the confiden...
IT security outsourcing is the establishment of a contractual relationship between an organization w...
IT security outsourcing is the establishment of a contractual relationship between an organization w...
Recent research points to the emergence of 'tripartite standards regimes' (TSRs), i.e., regimes base...
EGovernment implementations are nowadays common even amongst the smallest and countries around the w...
Information systems are used in overt and covert conflict and information operations target an oppon...
Information systems are used in overt and covert conflict and information operations target an oppon...
This paper scrutinises two of the leading models for dealing with so-called ‘tragedy of the commons’...
Records management practices are mandatory in many business and government operations. Records manag...
The rapid pace of technological developments in the area of information and communications technolog...
When most people go to the trouble of getting erasure tools to remove data from their hard drives th...
Studies in industrial clusters largely identify the institutional failures and imperfections that pr...
This paper presents the outcome of an engineering study as part of the design and development of a l...
The process of validating the correct operation of software is difficult for a variety of reasons. T...
AS/NZS4360:2004 suggests that the risk assessment process should not be conducted or information gat...
The term security assurance has been used in the computer science literature to express the confiden...
IT security outsourcing is the establishment of a contractual relationship between an organization w...
IT security outsourcing is the establishment of a contractual relationship between an organization w...
Recent research points to the emergence of 'tripartite standards regimes' (TSRs), i.e., regimes base...
EGovernment implementations are nowadays common even amongst the smallest and countries around the w...
Information systems are used in overt and covert conflict and information operations target an oppon...
Information systems are used in overt and covert conflict and information operations target an oppon...
This paper scrutinises two of the leading models for dealing with so-called ‘tragedy of the commons’...
Records management practices are mandatory in many business and government operations. Records manag...
The rapid pace of technological developments in the area of information and communications technolog...
When most people go to the trouble of getting erasure tools to remove data from their hard drives th...
Studies in industrial clusters largely identify the institutional failures and imperfections that pr...
This paper presents the outcome of an engineering study as part of the design and development of a l...
The process of validating the correct operation of software is difficult for a variety of reasons. T...
AS/NZS4360:2004 suggests that the risk assessment process should not be conducted or information gat...