[go: up one dir, main page]

Mardjan et al., 2019 - Google Patents

Open Reference Architecture for Security and Privacy Documentation

Mardjan et al., 2019

View PDF
Document ID
13347758535235293375
Author
Mardjan M
Jahan A
Publication year
Publication venue
Abgerufen von https://buildmedia. readthedocs. org/media/pdf/security-and-privacy-reference-architecture/latest/security-andprivacy-reference-architecture. pdf

External Links

Snippet

In our opinion security is a process, not a destination to arrive at. Good security design and implementation takes time, patience and hard work to achieve and maintain. You should always start with the basics by creating an architecture or overall design. As security and …
Continue reading at www.ismsforum.es (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Matulevičius Fundamentals of secure system modelling
Silowash et al. Common sense guide to mitigating insider threats
Kalloniatis et al. Towards the design of secure and privacy-oriented information systems in the cloud: Identifying the major concepts
Goodenough et al. Toward a theory of assurance case confidence
Death Information security handbook: develop a threat model and incident response strategy to build a strong information security framework
Silowash et al. Common sense guide to mitigating insider threats 4th edition
Paul Official (ISC) 2 Guide to the CSSLP
Parker Managing threats to health data and information: toward security
Beissel Cybersecurity investments: Decision support under economic aspects
De Faveri et al. Multi-paradigm deception modeling for cyber defense
Bailey Self-adaptive Authorisation Infrastructures
Tounsi Cyber-Vigilance and Digital Trust: Cyber Security in the Era of Cloud Computing and IoT
Paul Official (ISC) 2 guide to the CSSLP CBK
Williams Secure software lifecycle knowledge area issue
Mardjan et al. Open Reference Architecture for Security and Privacy Documentation
Williams Secure software lifecycle
Niemann Enterprise architecture management and its role in IT governance and IT investment planning
Reichert et al. Software supply chain security: a systematic literature review
Hon Attack and defence
King Bring your own device security awareness and security behavior: a quantitative explanatory study
Vasudevan et al. Application security in the ISO27001: 2013 Environment
Ee et al. Secure software development techniques and challenges in their practical application
Kangwa Prevention of personally identifiable information leakage in ecommerce using offline data minimization and online pseudonymisation.
Williams Secure Software Lifecycle Knowledge Area Version..
Ros Digital forensic readiness in mobile device management systems