Please use this identifier to cite or link to this item: http://hdl.handle.net/1942/8069
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSCHREURS, Jeanne-
dc.contributor.authorMOREAU, Rachel-
dc.date.accessioned2008-04-01T07:49:21Z-
dc.date.available2008-04-01T07:49:21Z-
dc.date.issued2007-
dc.identifier.citationVan Welden, D. (Ed.) 4th Future Business Technology Conference. p. 39-43.-
dc.identifier.isbn9789077381335-
dc.identifier.urihttp://hdl.handle.net/1942/8069-
dc.description.abstractSecurity becomes more and more important and companies are aware that it has become a management problem. It’s critical to know what are the critical resources and processes of the company and their weaknesses. A security audit can be a handy solution. We have developed BEVA, a method to critically analyse the company and to uncover the weak spots in the security system. BEVA results also in a general security score and security scores for each security factor. These will be used in the risk analysis. The goal is to increase the security score Ss to a postulated level by focusing on the critical security factors, those with a low security score. We will identify the critical threats too, being those with a high risk or expected loss for the company if they occur. In the next stage it will be resolved to implement some security measures to decrease the probabilities of the occurrence of the threats and as a consequence to decrease the risks and to improve the security situation.-
dc.language.isoen-
dc.publisherEUROSIS-
dc.subject.otherSecurity, Risk-
dc.titleICT security management-
dc.typeProceedings Paper-
local.bibliographicCitation.authorsVan Welden, D.-
local.bibliographicCitation.conferencedateApril 25-27, 2007-
local.bibliographicCitation.conferencenameECES2007, The European Concurrent Engineering Conference-
local.bibliographicCitation.conferenceplaceDelft, The Netherlands-
dc.identifier.epage43-
dc.identifier.spage39-
local.bibliographicCitation.jcatC1-
local.type.specifiedProceedings Paper-
dc.bibliographicCitation.oldjcatC2-
local.bibliographicCitation.btitle4th Future Business Technology Conference-
item.fulltextWith Fulltext-
item.accessRightsOpen Access-
item.fullcitationSCHREURS, Jeanne & MOREAU, Rachel (2007) ICT security management. In: Van Welden, D. (Ed.) 4th Future Business Technology Conference. p. 39-43..-
item.contributorSCHREURS, Jeanne-
item.contributorMOREAU, Rachel-
Appears in Collections:Research publications
Files in This Item:
File Description SizeFormat 
ICT seccurity.pdf393.25 kBAdobe PDFView/Open
Show simple item record

Page view(s)

20
checked on Nov 7, 2023

Download(s)

16
checked on Nov 7, 2023

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.