2004
DOI: 10.1002/j.2334-5837.2004.tb00530.x
|View full text |Cite
|
Sign up to set email alerts
|

4.3.1 Security Engineering: Systems Engineering of Security through the Adaptation and Application of Risk Management

Abstract: Information Technology (IT) Security Risk Management is a critical task in the organization, which must protect its resources and data against the loss of confidentiality, integrity, and availability. As systems become more complex and diverse, and more vulnerabilities are discovered while attacks from intrusions and malicious content increase, it is becoming increasingly difficult to manage IT security. This paper describes an approach to address IT security risk through risk management and mitigation in both… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2015
2015
2015
2015

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 4 publications
(2 reference statements)
0
2
0
Order By: Relevance
“…Customer satisfaction is typically estimated by the number of customers making replicate purchases. It is driven by several organizational variables which include e-business network security, robust and efficient infrastructure, complementary services, reliability and regulatory requirements [2], [13], [16], [18], [24], [28].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Customer satisfaction is typically estimated by the number of customers making replicate purchases. It is driven by several organizational variables which include e-business network security, robust and efficient infrastructure, complementary services, reliability and regulatory requirements [2], [13], [16], [18], [24], [28].…”
Section: Introductionmentioning
confidence: 99%
“…In other words, security can be defined as an activity that protects company resources and its infrastructures as well as reducing or eliminating the risks of misuse, loss and damage. It designates controls that an e-business organization needs to implement in order to guarantee that it is rationally managing these risks [13], [27]. Adaptive security, which relates to ensuring sufficient security for ICT infrastructures were found to be directly related to liveability and customer satisfaction.…”
Section: Introductionmentioning
confidence: 99%