Results 11 to 20 of about 236,356 (234)
A framework for security requirements engineering [PDF]
This paper presents a framework for security requirements elicitation and analysis, based upon the construction of a context for the system and satisfaction arguments for the security of the system. One starts with enumeration of security goals based on
Haley, Charles B. +3 more
core +1 more source
Integrating security and usability into the requirements and design process [PDF]
According to Ross Anderson, 'Many systems fail because their designers protect the wrong things or protect the right things in the wrong way'. Surveys also show that security incidents in industry are rising, which highlights the difficulty of designing ...
Flechais, I, Mascolo, C, Sasse, MA
core +1 more source
How does intellectual capital align with cyber security? [PDF]
Purpose – To position the preservation and protection of intellectual capital as a cyber security concern. We outline the security requirements of intellectual capital to help Boards of Directors and executive management teams to understand their ...
Renaud, Karen +2 more
core +3 more sources
Run-time risk management in adaptive ICT systems [PDF]
We will present results of the SERSCIS project related to risk management and mitigation strategies in adaptive multi-stakeholder ICT systems.
Chakravarthy, Ajay +4 more
core +1 more source
COMPUTER SECURITY AND SECURITY TECHNOLOGIES [PDF]
With the increasing development of computer and communications technology growth and increasing needs and development of information systems security. The problem of security must be approached with greater caution.
Lazar Stošić, Dragan Veličković
doaj
Introduction: considering the information threats and the need to procedures for develop and improve security and confidentiality, international standard organization (ISO) established information security standard ISO/IEC 27001.
Rouhollah Sheikh Abumasoudi +3 more
doaj +1 more source
Computing Optimal Security Strategies for Interdependent Assets
Appears in Proceedings of the Twenty-Eighth Conference on Uncertainty in Artificial Intelligence (UAI2012)
Letchford, Joshua, Vorobeychik, Yevgeniy
openaire +2 more sources
Determining Training Needs for Cloud Infrastructure Investigations using I-STRIDE [PDF]
As more businesses and users adopt cloud computing services, security vulnerabilities will be increasingly found and exploited. There are many technological and political challenges where investigation of potentially criminal incidents in the cloud are ...
AS Sodiya +12 more
core +1 more source
Enhancing security incident response follow-up efforts with lightweight agile retrospectives [PDF]
Security incidents detected by organizations are escalating in both scale and complexity. As a result, security incident response has become a critical mechanism for organizations in an effort to minimize the damage from security incidents.
Glisson, William Bradley +2 more
core +2 more sources
Estimating ToE Risk Level using CVSS [PDF]
Security management is about calculated risk and requires continuous evaluation to ensure cost, time and resource effectiveness. Parts of which is to make future-oriented, cost-benefit investments in security.
Franqueira, Virginia Nunes Leal +1 more
core +3 more sources

