2005
DOI: 10.1007/11424826_49
|View full text |Cite
|
Sign up to set email alerts
|

Design Procedure of IT Systems Security Countermeasures

Abstract: Abstract. The developers of the security policy should recognize the importance of building security countermeasures by using both technical and non-technical methods, such as personnel and operational facts. Security countermeasures may be made for formulating an effective overall security solution to address threats at all layers of the information infrastructure. This paper uses the security engineering principles for determining appropriate technical security countermeasures. It includes information on thr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2005
2005
2020
2020

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 4 publications
(2 reference statements)
0
2
0
Order By: Relevance
“…Security countermeasures may be established for formulating an effective overall security solution to address threats at all layers of the information infrastructure (Kim & Lee, 2005). Kim and Lee (2005) propose a method for the selection of countermeasures.…”
Section: Case Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…Security countermeasures may be established for formulating an effective overall security solution to address threats at all layers of the information infrastructure (Kim & Lee, 2005). Kim and Lee (2005) propose a method for the selection of countermeasures.…”
Section: Case Analysismentioning
confidence: 99%
“…Security countermeasures may be established for formulating an effective overall security solution to address threats at all layers of the information infrastructure (Kim & Lee, 2005). Kim and Lee (2005) propose a method for the selection of countermeasures. In their method, information value, threat level, security services, the scope of security services are considered for selection of both technical and non-technical countermeasures.…”
Section: Case Analysismentioning
confidence: 99%