Please use this identifier to cite or link to this item: http://hdl.handle.net/1942/8068
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSCHREURS, Jeanne-
dc.contributor.authorMOREAU, Rachel-
dc.date.accessioned2008-04-01T07:41:31Z-
dc.date.available2008-04-01T07:41:31Z-
dc.date.issued2008-
dc.identifier.citationInternational Journal Information Technologies and knowledge (IJ ITK), 2. p. 1-10-
dc.identifier.issn1313-0455-
dc.identifier.urihttp://hdl.handle.net/1942/8068-
dc.description.abstractSecurity becomes more and more important and companies are aware that it has become a management problem. It’s critical to know what are the critical resources and processes of the company and their weaknesses. A security audit can be a handy solution. We have developed BEVA, a method to critically analyse the company and to uncover the weak spots in the security system. BEVA results in security scores for each security factor and also in a general security score. The goal is to increase the security score Ss to a postulated level by focusing on the critical security factors, those with a low security score.-
dc.language.isoen-
dc.publisherFOI Bulgaria-
dc.subject.otherSecurity, Scan, Audit-
dc.titleICT security management-
dc.typeJournal Contribution-
dc.identifier.epage10-
dc.identifier.spage1-
dc.identifier.volume2-
local.bibliographicCitation.jcatA1-
local.type.refereedRefereed-
local.type.specifiedArticle-
dc.bibliographicCitation.oldjcatA1-
local.identifier.vabbc:vabb:85662-
dc.identifier.urlhttp://www.foibg.com/ijitk/ijitk-finfo.htm-
item.contributorSCHREURS, Jeanne-
item.contributorMOREAU, Rachel-
item.fullcitationSCHREURS, Jeanne & MOREAU, Rachel (2008) ICT security management. In: International Journal Information Technologies and knowledge (IJ ITK), 2. p. 1-10.-
item.accessRightsClosed Access-
item.fulltextWith Fulltext-
item.validationvabb 2010-
crisitem.journal.issn1313-0455-
Appears in Collections:Research publications
Files in This Item:
File Description SizeFormat 
ict securit.pdf512.83 kBAdobe PDFView/Open
Show simple item record

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.