1995
DOI: 10.6028/nist.sp.800-12
|View full text |Cite
|
Sign up to set email alerts
|

An introduction to computer security :

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
37
0
1

Year Published

1997
1997
2021
2021

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 73 publications
(43 citation statements)
references
References 0 publications
1
37
0
1
Order By: Relevance
“…The methodology for risk assessment comprises basic steps common to various standards and guidelines (see 217 Guttman and Roback, 1995;ISO/IEC, 2011;Ross, 2011;Landoll, 2005). The salient difference is the use of an FCM model capturing influences between assets and allowing their dependencies to be tracked during a risk aggregation.…”
Section: Methodology Of Risk Assessmentmentioning
confidence: 99%
See 2 more Smart Citations
“…The methodology for risk assessment comprises basic steps common to various standards and guidelines (see 217 Guttman and Roback, 1995;ISO/IEC, 2011;Ross, 2011;Landoll, 2005). The salient difference is the use of an FCM model capturing influences between assets and allowing their dependencies to be tracked during a risk aggregation.…”
Section: Methodology Of Risk Assessmentmentioning
confidence: 99%
“…According to Guttman and Roback (1995) as well as Hoo (2000), security is the protection afforded to an information system in order to preserve the integrity of data and system functions, their availability, authenticity and confidentiality.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Information Security refers to the protection or safeguarding of any information from being breached against any unauthorized access and maintains integrity and confidentiality [5]. With growing dependency on the internet and email, security risks and breaches are also increasing drastically.…”
Section: Information Securitymentioning
confidence: 99%
“…Security can also be defined as a layer created to separate assets from threats [4]. In order to understand clearly about security, it is very important to understand important terminologies [5]. This research paper talks about important terminologies, concerns and challenges on Information System and Security Audit.…”
Section: Introductionmentioning
confidence: 99%