Zobrazeno 1 - 10
of 22
pro vyhledávání: '"Audrey J. Dorofee"'
Autor:
Michael Murray, David A. Mundie, Audrey J. Dorofee, Robin R Ruefle, Allen D. Householder, Samuel J. Perl
Publikováno v:
IEEE Security & Privacy. 12:16-26
When computer security incidents occur, it's critical that organizations be able to handle them in a timely manner. The speed with which an organization can recognize, analyze, and respond to an incident will affect the damage and lower recovery cost
Autor:
D. Lambert, J. Coleman, M. Brummett, Audrey J. Dorofee, Keith R. McCall, Jeffery Collmann, Christopher J. Alberts, Ted Cooper, D. DeFord, Dennis M. Seymour
Publikováno v:
CARS
“Beyond Good Practice: Why HIPAA only addresses part of the data security problem” presents special papers illustrating the complexities of deploying good data security practices for the protection of computerized information assets in the contem
An incident management (IM) function is responsible for performing the broad range of activities associated with managing computer security events and incidents. For many years, the Software Engineering Institute's (SEI) CERT; Division has developed
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::6a42475d932765045946fd4bc387e938
https://doi.org/10.21236/ada609862
https://doi.org/10.21236/ada609862
Although most programs and organizations use risk management when developing and operating software-reliant systems, preventable failures continue to occur at an alarming rate. In many instances, the root causes of these preventable failures can be t
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::4057cbb0e627263be689ca2c5dcb7f4c
https://doi.org/10.21236/ada611114
https://doi.org/10.21236/ada611114
Publikováno v:
HICSS
In today's business environment, multiple organizations must routinely work together in software supply chains when acquiring, developing, operating, and maintaining software products. The programmatic and product complexity inherent in software supp
In today's business and operational environments, multiple organizations routinely work collaboratively in pursuit of a common mission, creating a degree of programmatic complexity that is difficult to manage effectively. Success in these distributed
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::1098e852ad2ddf923f326cbf3c5db65b
Successful management of incidents that threaten an organization's cyber security is a complex endeavor. Frequently an organization's primary focus on the response aspects of security incidents results in its failure to manage incidents beyond simply
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::463c4621408103c986c925290c01f95b
https://doi.org/10.21236/ada468688
https://doi.org/10.21236/ada468688
Autor:
Audrey J. Dorofee
Publikováno v:
Guarding Your Business ISBN: 0306484943
There are many ways to approach information security. This chapter looks at information security from a risk management point of view by focusing on the evaluation of information security risks. The evaluation looks at information-related assets that
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::edab83136947a7cf0bdcd8a0982019fa
https://doi.org/10.1007/0-306-48638-5_9
https://doi.org/10.1007/0-306-48638-5_9
The Operationally Critical Threat, Asset, and Vulnerability EvaluationSM (OCTAVE) approach defines a risk-based strategic assessment and planning technique for security. OCTAVE is a self-directed approach, meaning that people from an organization ass
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::cdc13e8ada185d900cbce57d4e413715
https://doi.org/10.21236/ada453296
https://doi.org/10.21236/ada453296
The Operationally Critical Threat, Asset, and Vulnerability EvaluationSM (OCTAVE ) approach defines a risk-based strategic assessment and planning technique for security. OCTAVE is a self-directed approach, meaning that people from an organization as
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e28458269388893c5e5e548dc9d3a2ee
https://doi.org/10.21236/ada453302
https://doi.org/10.21236/ada453302