scispace - formally typeset
Open AccessJournal ArticleDOI

Information Security Management Handbook

Isij Monitor
- 01 Jan 2000 - 
- Vol. 4, pp 117-120
About
This article is published in Information & Security: An International Journal.The article was published on 2000-01-01 and is currently open access. It has received 177 citations till now. The article focuses on the topics: Security information and event management & Certified Information Security Manager.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Computer Forensics Field Triage Process Model

TL;DR: The current article describes the CFFTPM in detail, discusses the model’s forensic soundness, investigative support capabilities and practical considerations, and proposes an onsite or field approach for providing the identification, analysis and interpretation of digital evidence in a short time frame.
Journal ArticleDOI

Face Spoofing Detection Through Visual Codebooks of Spectral Temporal Cubes

TL;DR: This paper introduces a low cost and software-based method for detecting spoofing attempts in face recognition systems and extracts time-spectral feature descriptors from the video that can be understood as a low-level feature descriptor that gathers temporal and spectral information across the biometric sample.
Journal ArticleDOI

The positive outcomes of information security awareness training in companies - A case study

TL;DR: The results show the effectiveness of the project and the impact of human awareness on the success of information security management programmes in companies, and some crucial results, facts and methods are given that can be used as a guideline for further similar projects.
DissertationDOI

Finding multi-step attacks in computer networks using heuristic search and mobile ambients

TL;DR: This thesis proposes an approach called MsAMS (Multi-step Attack Modelling and Simulation), demonstrated by a proof-of-concept tool, to automatically find multi-step network attacks.

The CIA Strikes Back: Redefining Confidentiality, Integrity and Availability in Security

TL;DR: The main argument is that the CIA triad will continue to assume a major role in information security practice, however, this is not due to the fact that practitioners have discarded, or rejected the enhancements that socio-technical security scholars have proposed over the years; rather, it is because these enhancements can be accommodated by a broader re-conceptualization of the originalCIA triad.
References
More filters
Journal ArticleDOI

Computer Forensics Field Triage Process Model

TL;DR: The current article describes the CFFTPM in detail, discusses the model’s forensic soundness, investigative support capabilities and practical considerations, and proposes an onsite or field approach for providing the identification, analysis and interpretation of digital evidence in a short time frame.
Journal ArticleDOI

Face Spoofing Detection Through Visual Codebooks of Spectral Temporal Cubes

TL;DR: This paper introduces a low cost and software-based method for detecting spoofing attempts in face recognition systems and extracts time-spectral feature descriptors from the video that can be understood as a low-level feature descriptor that gathers temporal and spectral information across the biometric sample.
Journal ArticleDOI

The positive outcomes of information security awareness training in companies - A case study

TL;DR: The results show the effectiveness of the project and the impact of human awareness on the success of information security management programmes in companies, and some crucial results, facts and methods are given that can be used as a guideline for further similar projects.
DissertationDOI

Finding multi-step attacks in computer networks using heuristic search and mobile ambients

TL;DR: This thesis proposes an approach called MsAMS (Multi-step Attack Modelling and Simulation), demonstrated by a proof-of-concept tool, to automatically find multi-step network attacks.

The CIA Strikes Back: Redefining Confidentiality, Integrity and Availability in Security

TL;DR: The main argument is that the CIA triad will continue to assume a major role in information security practice, however, this is not due to the fact that practitioners have discarded, or rejected the enhancements that socio-technical security scholars have proposed over the years; rather, it is because these enhancements can be accommodated by a broader re-conceptualization of the originalCIA triad.