Mardjan et al., 2019 - Google Patents
Open Reference Architecture for Security and Privacy DocumentationMardjan et al., 2019
View PDF- Document ID
- 13347758535235293375
- Author
- Mardjan M
- Jahan A
- Publication year
- Publication venue
- Abgerufen von https://buildmedia. readthedocs. org/media/pdf/security-and-privacy-reference-architecture/latest/security-andprivacy-reference-architecture. pdf
External Links
Snippet
In our opinion security is a process, not a destination to arrive at. Good security design and implementation takes time, patience and hard work to achieve and maintain. You should always start with the basics by creating an architecture or overall design. As security and …
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Matulevičius | Fundamentals of secure system modelling | |
Silowash et al. | Common sense guide to mitigating insider threats | |
Kalloniatis et al. | Towards the design of secure and privacy-oriented information systems in the cloud: Identifying the major concepts | |
Goodenough et al. | Toward a theory of assurance case confidence | |
Death | Information security handbook: develop a threat model and incident response strategy to build a strong information security framework | |
Silowash et al. | Common sense guide to mitigating insider threats 4th edition | |
Paul | Official (ISC) 2 Guide to the CSSLP | |
Parker | Managing threats to health data and information: toward security | |
Beissel | Cybersecurity investments: Decision support under economic aspects | |
De Faveri et al. | Multi-paradigm deception modeling for cyber defense | |
Bailey | Self-adaptive Authorisation Infrastructures | |
Tounsi | Cyber-Vigilance and Digital Trust: Cyber Security in the Era of Cloud Computing and IoT | |
Paul | Official (ISC) 2 guide to the CSSLP CBK | |
Williams | Secure software lifecycle knowledge area issue | |
Mardjan et al. | Open Reference Architecture for Security and Privacy Documentation | |
Williams | Secure software lifecycle | |
Niemann | Enterprise architecture management and its role in IT governance and IT investment planning | |
Reichert et al. | Software supply chain security: a systematic literature review | |
Hon | Attack and defence | |
King | Bring your own device security awareness and security behavior: a quantitative explanatory study | |
Vasudevan et al. | Application security in the ISO27001: 2013 Environment | |
Ee et al. | Secure software development techniques and challenges in their practical application | |
Kangwa | Prevention of personally identifiable information leakage in ecommerce using offline data minimization and online pseudonymisation. | |
Williams | Secure Software Lifecycle Knowledge Area Version.. | |
Ros | Digital forensic readiness in mobile device management systems |