A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Building an Enterprise it Security Management System
[chapter]
2003
Security and Privacy in the Age of Uncertainty
Moving towards a knowledge economy, managing effectively and safely the corporate data is the key to an organisation's survival and success. Corporative employees that technologies like computers, mobile and portable devices to access the information. Safeguarding corporate information that flows in unprotected land lines and airwaves is critically important. Adversaries attack information systems, their tools and techniques are numerous and widely available. Analysis of various security
doi:10.1007/978-0-387-35691-4_16
fatcat:ca4mnbgbojesze5yxnuxctvuc4
more »
... ts has shown that the corporative attempt to achieve and maintain "absolute" security is not always effective and usually is far too expensive. To provide adequate protection for the modern enterprise, security architectures need to be build. These include security mechanisms, tools and policies that provide an acceptable level of protection for the enterprise. This paper presents the work in progress in developing an enterprise information security data model. The proposed prototype aims at presenting security specialists with more effective ways of managing existing security architectures implemented by the enterprise.
Incremental and Iterative Agile Methodology (IIAM): Hybrid Approach for Ontology Design towards Semantic Web Based Educational Systems Development
2016
International Journal of Knowledge Engineering
Leonid Smalov is with Creative Computing in Department of Computing, Coventry University, UK (e-mail: csx211@coventry.ac.uk). compromising much of its structure and semantics. ...
doi:10.18178/ijke.2016.2.1.044
fatcat:7bnjqfx3rbakld3jzupxznfwrq