A taxonomy for information security technologies
โ Scribed by H.S Venter; J.H.P Eloff
- Publisher
- Elsevier Science
- Year
- 2003
- Tongue
- English
- Weight
- 871 KB
- Volume
- 22
- Category
- Article
- ISSN
- 0167-4048
No coin nor oath required. For personal study only.
โฆ Synopsis
The Internet is a public network, which is open and used by all -also for communicating private information. "But private information should be secured!", I hear you say. Yes. But where should one start looking for help when attempting to secure private information? This paper discusses a taxonomy for information security technologies, which provides information on current state-ofthe-art technologies used to secure information at application, host and network level.
๐ SIMILAR VOLUMES
Security baselines have provided some guidelines to these organizations on which controls are, under general circumstances, the most effective to install to provide and acceptable level of protection. If an organization requires a higher level of protection in certain areas, a risk analysis can be c
Security Management consists of various
## Abstract Models for the economic evaluation of health technologies provide valuable information to decision makers. The choice of model structure is rarely discussed in published studies and can affect the results produced. Many papers describe good modelling practice, but few describe how to ch