As cyber-attacks grow worldwide, companies have begun to realize the importance of being protected against malicious actions that seek to violate their systems and access their information assets. Faced with this scenario, organizations must carry out correct and efficient management of their information security, which implies that they must adopt a proactive attitude, implementing standards that allow them to reduce the risk of computer attacks. Unfortunately, the problem is not only implementing a standard but also determining the best way to do it, defining an implementation path that considers the particular objectives and conditions of the organization and its availability of resources. This paper proposes a methodological approach fo...
University of Minnesota Ph.D. dissertation. December 2009. Major: Computer Science. Advisor: David L...
Today, attacks on sensitive data held by organizations and the resulting data breaches are unfortuna...
The protection of assets, including IT resources, intellectual property and business processes, agai...
Open Access journalChoosing an optimal investment in information security is an issue most companies...
AbstractChoosing an optimal investment in information security is an issue most companies face these...
Kiesling E, Ekelhart A, Grill B, Strauss C, Stummer C. Selecting security control portfolios: A mult...
The purpose of this paper is to present some directions to perform the risk man-agement for informat...
Continually the number of transactions carried out electronically via the internet has grown, as wel...
According to the PricewaterhouseCoopers analysis, the average cost of a single information security ...
News about various information security attacks against companies appears almost every day. The sour...
For organizations, the protection of information is of utmost importance. Throughout the years, orga...
Given the increasing frequency and severity of cyber attacks on information systems of all kinds, th...
Cette thèse aborde la problématique du management de la sécurité de l'information dans les organisat...
As we have discussed in the problem analysis of this thesis, there are still many challenges regardi...
Objectives According to the authors, such an assumption requires describing the impact of informatio...
University of Minnesota Ph.D. dissertation. December 2009. Major: Computer Science. Advisor: David L...
Today, attacks on sensitive data held by organizations and the resulting data breaches are unfortuna...
The protection of assets, including IT resources, intellectual property and business processes, agai...
Open Access journalChoosing an optimal investment in information security is an issue most companies...
AbstractChoosing an optimal investment in information security is an issue most companies face these...
Kiesling E, Ekelhart A, Grill B, Strauss C, Stummer C. Selecting security control portfolios: A mult...
The purpose of this paper is to present some directions to perform the risk man-agement for informat...
Continually the number of transactions carried out electronically via the internet has grown, as wel...
According to the PricewaterhouseCoopers analysis, the average cost of a single information security ...
News about various information security attacks against companies appears almost every day. The sour...
For organizations, the protection of information is of utmost importance. Throughout the years, orga...
Given the increasing frequency and severity of cyber attacks on information systems of all kinds, th...
Cette thèse aborde la problématique du management de la sécurité de l'information dans les organisat...
As we have discussed in the problem analysis of this thesis, there are still many challenges regardi...
Objectives According to the authors, such an assumption requires describing the impact of informatio...
University of Minnesota Ph.D. dissertation. December 2009. Major: Computer Science. Advisor: David L...
Today, attacks on sensitive data held by organizations and the resulting data breaches are unfortuna...
The protection of assets, including IT resources, intellectual property and business processes, agai...