Information Security Management Handbook
About:
This article is published in Information & Security: An International Journal.The article was published on 2000-01-01 and is currently open access. It has received 177 citations till now. The article focuses on the topics: Security information and event management & Certified Information Security Manager.read more
Citations
More filters
Journal ArticleDOI
Computer Forensics Field Triage Process Model
TL;DR: The current article describes the CFFTPM in detail, discusses the model’s forensic soundness, investigative support capabilities and practical considerations, and proposes an onsite or field approach for providing the identification, analysis and interpretation of digital evidence in a short time frame.
Journal ArticleDOI
Face Spoofing Detection Through Visual Codebooks of Spectral Temporal Cubes
TL;DR: This paper introduces a low cost and software-based method for detecting spoofing attempts in face recognition systems and extracts time-spectral feature descriptors from the video that can be understood as a low-level feature descriptor that gathers temporal and spectral information across the biometric sample.
Journal ArticleDOI
The positive outcomes of information security awareness training in companies - A case study
TL;DR: The results show the effectiveness of the project and the impact of human awareness on the success of information security management programmes in companies, and some crucial results, facts and methods are given that can be used as a guideline for further similar projects.
DissertationDOI
Finding multi-step attacks in computer networks using heuristic search and mobile ambients
TL;DR: This thesis proposes an approach called MsAMS (Multi-step Attack Modelling and Simulation), demonstrated by a proof-of-concept tool, to automatically find multi-step network attacks.
The CIA Strikes Back: Redefining Confidentiality, Integrity and Availability in Security
TL;DR: The main argument is that the CIA triad will continue to assume a major role in information security practice, however, this is not due to the fact that practitioners have discarded, or rejected the enhancements that socio-technical security scholars have proposed over the years; rather, it is because these enhancements can be accommodated by a broader re-conceptualization of the originalCIA triad.
References
More filters
Journal ArticleDOI
Computer Forensics Field Triage Process Model
TL;DR: The current article describes the CFFTPM in detail, discusses the model’s forensic soundness, investigative support capabilities and practical considerations, and proposes an onsite or field approach for providing the identification, analysis and interpretation of digital evidence in a short time frame.
Journal ArticleDOI
Face Spoofing Detection Through Visual Codebooks of Spectral Temporal Cubes
TL;DR: This paper introduces a low cost and software-based method for detecting spoofing attempts in face recognition systems and extracts time-spectral feature descriptors from the video that can be understood as a low-level feature descriptor that gathers temporal and spectral information across the biometric sample.
Journal ArticleDOI
The positive outcomes of information security awareness training in companies - A case study
TL;DR: The results show the effectiveness of the project and the impact of human awareness on the success of information security management programmes in companies, and some crucial results, facts and methods are given that can be used as a guideline for further similar projects.
DissertationDOI
Finding multi-step attacks in computer networks using heuristic search and mobile ambients
TL;DR: This thesis proposes an approach called MsAMS (Multi-step Attack Modelling and Simulation), demonstrated by a proof-of-concept tool, to automatically find multi-step network attacks.
The CIA Strikes Back: Redefining Confidentiality, Integrity and Availability in Security
TL;DR: The main argument is that the CIA triad will continue to assume a major role in information security practice, however, this is not due to the fact that practitioners have discarded, or rejected the enhancements that socio-technical security scholars have proposed over the years; rather, it is because these enhancements can be accommodated by a broader re-conceptualization of the originalCIA triad.