Computer Security: Planning to Protect Corporate Assets
1990
The author describes the strengths and weaknesses of current systems and reveals how planning can preempt a breach in security.
Keywords:
- Computer security model
- Security through obscurity
- Countermeasure (computer)
- Public relations
- Security convergence
- Economics
- Corporate security
- Security information and event management
- Computer security
- Certified Information Security Manager
- Security management
- Security service
- Asset (computer security)
- Cloud computing security
- Correction
- Source
- Cite
- Save
- Machine Reading By IdeaReader
0
References
14
Citations
NaN
KQI