The results of various threats vary considerably: some impact the confidentiality or integrity of data while others affect the availability of a system.
7498 2 Security Architecture Design How To Acquire TheCurrently, companies are struggling to know what the thréats to their information assets are and how to acquire the required means to combat them which proceeds to create a problem.To improve our knowing of security threats, we suggest a security threat category design which enables us to study the threats course impact rather of a threat influence as a danger varies over period.
This document addresses various criteria of info system protection risks classification and gives a review of most threats classification models. We specify a cross types model for info system security threat classification in purchase to propose a category architecture that supports all threat classification concepts and helps organizations implement their information security methods. Previous content in issue Next article in problem Keywords Information system security Threat classification Threat requirements security danger. 7498 2 Security Architecture Design Download Complete TextDownload complete text in PDF Recommended content Citing posts (0) Choice and Peer-review under obligation of the Program Chairs. View Abstract Copyright 2014 Released by Elsevier W.V. Citing posts Post Metrics Watch content metrics About ScienceDirect Remote access Purchasing cart Advertise Contact and support Terms and problems Privacy policy We make use of cookies to assist supply and enhance our services and custom content and advertisements. Copyright 2020 Elsevier W.V. ScienceDirect is usually a registered brand of Elsevier B.Sixth is v.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |