Information Security Risks and Managed Security Service

被引:0
|
作者
Navarro, Luis
机构
来源
关键词
D O I
10.1016/S1363-4127(01)00305-3
中图分类号
学科分类号
摘要
引用
收藏
页码:28 / 36
相关论文
共 50 条
  • [31] An Aggregated Fuzzy Model for the Selection of a Managed Security Service Provider
    Shahrasbi, Alireza
    Shamizanjani, Mehdi
    Alavidoost, M. H.
    Akhgar, Babak
    INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGY & DECISION MAKING, 2017, 16 (03) : 625 - 684
  • [32] Global managed security service to protect customers' ICT environments
    Kawahara, Katsuhiro
    Naito, Hisahiro
    Fujitsu Scientific and Technical Journal, 2019, 55 (05): : 10 - 15
  • [33] Global Managed Security Service to Protect Customers' ICT Environments
    Kawahara, Katsuhiro
    Naito, Hisahiro
    FUJITSU SCIENTIFIC & TECHNICAL JOURNAL, 2019, 55 (05): : 10 - 15
  • [34] An analysis of ISPs' role as managed security service providers (MSSPs)
    Choi, YS
    Seo, DI
    7th International Conference on Advanced Communication Technology, Vols 1 and 2, Proceedings, 2005, : 624 - 626
  • [35] The risks of security
    Crampton, JW
    ENVIRONMENT AND PLANNING D-SOCIETY & SPACE, 2002, 20 (06): : 631 - 635
  • [36] Information Security: Risks Related to the Cultural of Personnel (Review)
    Astakhova, L. V.
    SCIENTIFIC AND TECHNICAL INFORMATION PROCESSING, 2015, 42 (02) : 41 - 52
  • [37] Monitoring information security risks within health care
    van Deursen, Nicole
    Buchanan, William J.
    Duff, Alistair
    COMPUTERS & SECURITY, 2013, 37 : 31 - 45
  • [38] Information security threats to mobile service development
    Savola, Reijo
    Ahonen, Pasi
    Roning, Juha
    2007 4TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2007, : 145 - +
  • [39] Using prediction markets to hedge information security risks
    Pandey, Pankaj (pankaj.pandey2@hig.no), 1600, Springer Verlag (8743):
  • [40] Information Security Economics: Induced Risks and Latent Costs
    Frangopoulos, Evangelos
    Eloff, Mariki
    Venter, Lucas
    PROCEEDINGS OF THE 13TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS-2014), 2014, : 80 - 87