Please use this identifier to cite or link to this item:
http://hdl.handle.net/1942/8088
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | SCHREURS, Jeanne | - |
dc.contributor.author | MOREAU, Rachel | - |
dc.date.accessioned | 2008-04-01T13:07:37Z | - |
dc.date.available | 2008-04-01T13:07:37Z | - |
dc.date.issued | 2008 | - |
dc.identifier.citation | Cyber Security Information Intelligence Research Workshop, Oak Ridge National Laboratory. | - |
dc.identifier.uri | http://hdl.handle.net/1942/8088 | - |
dc.description.abstract | ABSTRACT It’s critical to know what are the critical resources and processes of the company and their weaknesses. Security has become a management problem. A security audit can offer a handy solution. We have developed a method and a system. The system is called BEVA. BEVA includes a security audit measuring the security situation of the organization in 38 security factors. Based on this audit, it delivers an overall security score and one for each security factor. It also supports management in detecting the critical security factors in the company. We have used the results from these audits to develop a security policy model. | - |
dc.language.iso | en | - |
dc.subject.other | audit, ICT security, security policy | - |
dc.title | ICT security is a management issue | - |
dc.type | Conference Material | - |
local.bibliographicCitation.conferencename | Cyber Security Information Intelligence Research Workshop | - |
local.bibliographicCitation.conferenceplace | Oak Ridge National Laboratory | - |
local.bibliographicCitation.jcat | C2 | - |
dc.description.notes | an extended abstract has been sent | - |
local.type.specified | Conference Material | - |
dc.bibliographicCitation.oldjcat | - | |
item.contributor | SCHREURS, Jeanne | - |
item.contributor | MOREAU, Rachel | - |
item.fullcitation | SCHREURS, Jeanne & MOREAU, Rachel (2008) ICT security is a management issue. In: Cyber Security Information Intelligence Research Workshop, Oak Ridge National Laboratory.. | - |
item.accessRights | Open Access | - |
item.fulltext | With Fulltext | - |
Appears in Collections: | Research publications |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
CSIIRW08-ab.pdf | Conference material | 43.66 kB | Adobe PDF | View/Open |
Google ScholarTM
Check
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.