Qualitative initial risk analysis for selecting risk analysis approach suitable for IT security policy

Author(s):  
Jung-Ho Eom ◽  
Young-Hyun Choi ◽  
Seon-Ho Park ◽  
Tai-Myoung Chung
2017 ◽  
Vol 13 (12) ◽  
pp. 1624-1638 ◽  
Author(s):  
Jesica Tamara Castillo-Rodríguez ◽  
Jason T. Needham ◽  
Adrián Morales-Torres ◽  
Ignacio Escuder-Bueno

2018 ◽  
Vol 12 (3) ◽  
pp. 341-363
Author(s):  
José Willer do Prado ◽  
Francisval de Melo Carvalho ◽  
Gideon Carvalho de Benedicto ◽  
Valderí de Castro Alcântara ◽  
Antonio Carlos dos Santos

Author(s):  
Joseph Kizza ◽  
Florence Migga Kizza

In the last chapter, we discussed the basics of network security. Among the issues that we briefly touched on are the techniques and best practices that are currently being used by many security personnel in a variety of networks that make up the communication infrastructure. In this chapter, we are going to start with what is considered to be the most basic of all security techniques—security.policy. We will discuss several issues about security policy, like what constitutes a good policy and how to formulate, develop, write implement, and maintain a security policy.


2019 ◽  
Vol 32 (14) ◽  
pp. 10573-10591
Author(s):  
Hamzeh Soltanali ◽  
Abbas Rohani ◽  
Mohammad Tabasizadeh ◽  
Mohammad Hossein Abbaspour-Fard ◽  
Aditya Parida

Sign in / Sign up

Export Citation Format

Share Document