Please use this identifier to cite or link to this item:
http://hdl.handle.net/1942/8068
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | SCHREURS, Jeanne | - |
dc.contributor.author | MOREAU, Rachel | - |
dc.date.accessioned | 2008-04-01T07:41:31Z | - |
dc.date.available | 2008-04-01T07:41:31Z | - |
dc.date.issued | 2008 | - |
dc.identifier.citation | International Journal Information Technologies and knowledge (IJ ITK), 2. p. 1-10 | - |
dc.identifier.issn | 1313-0455 | - |
dc.identifier.uri | http://hdl.handle.net/1942/8068 | - |
dc.description.abstract | Security becomes more and more important and companies are aware that it has become a management problem. It’s critical to know what are the critical resources and processes of the company and their weaknesses. A security audit can be a handy solution. We have developed BEVA, a method to critically analyse the company and to uncover the weak spots in the security system. BEVA results in security scores for each security factor and also in a general security score. The goal is to increase the security score Ss to a postulated level by focusing on the critical security factors, those with a low security score. | - |
dc.language.iso | en | - |
dc.publisher | FOI Bulgaria | - |
dc.subject.other | Security, Scan, Audit | - |
dc.title | ICT security management | - |
dc.type | Journal Contribution | - |
dc.identifier.epage | 10 | - |
dc.identifier.spage | 1 | - |
dc.identifier.volume | 2 | - |
local.bibliographicCitation.jcat | A1 | - |
local.type.refereed | Refereed | - |
local.type.specified | Article | - |
dc.bibliographicCitation.oldjcat | A1 | - |
local.identifier.vabb | c:vabb:85662 | - |
dc.identifier.url | http://www.foibg.com/ijitk/ijitk-finfo.htm | - |
item.contributor | SCHREURS, Jeanne | - |
item.contributor | MOREAU, Rachel | - |
item.fullcitation | SCHREURS, Jeanne & MOREAU, Rachel (2008) ICT security management. In: International Journal Information Technologies and knowledge (IJ ITK), 2. p. 1-10. | - |
item.accessRights | Closed Access | - |
item.fulltext | With Fulltext | - |
item.validation | vabb 2010 | - |
crisitem.journal.issn | 1313-0455 | - |
Appears in Collections: | Research publications |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
ict securit.pdf | 512.83 kB | Adobe PDF | View/Open |
Google ScholarTM
Check
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.