A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Better Securing an Infrastructure for Telework
2006
Journal of Cases on Information Technology
The XYZ Hardware Company, Inc. infrastructure features high volumes of sensitive and confidential corporate data relevant to internal and external transactions. From 1999 to the middle of 2004, XYZ has utilized the Operationally Critical Threat, Asset, and Vulnerability Evaluation SM (OCTAVE SM ) Model version 1e to protect its network. The OCTAVE SM Model has proven to be helpful for XYZ by identifying over 198 potential security breaches. However, in 2004, when XYZ began to enhance its
doi:10.4018/jcit.2006100106
fatcat:l5cpvpz76jbbdkzxcr64jzexde