The Methodology For Detecting And Managing The Abuse Of It Systems
This paper focuses on the processes of dealing with security breaches which are becomingone of the most pressing problems in every organization whose systems are connected to theglobal web. The study presents the most widely used methodologies which were designed inorder to detect and react to secur...
Main Authors: | Mirosław Ryba, Józef Sulwiński, Aleksander Poniewierski |
---|---|
Format: | Article |
Language: | English |
Published: |
AGH University of Science and Technology Press
2008-01-01
|
Series: | Computer Science |
Subjects: | |
Online Access: | http://journals.agh.edu.pl/csci/article/download/193/114 |
Similar Items
-
Computer Security Incident Response Team Effectiveness: A Needs Assessment
by: Rick Van der Kleij, et al.
Published: (2017-12-01) -
Comparative Analysis and Design of Cybersecurity Maturity Assessment Methodology Using NIST CSF, COBIT, ISO/IEC 27002 and PCI DSS
by: Diah Sulistyowati, et al.
Published: (2020-12-01) -
An Analysis of the Impact of Information Security Policies on Computer Security Breach Incidents in Law Firms
by: Heikkila, Faith M.
Published: (2009) -
Challenges with Incident Management : In Information Technology
by: Isaksson, Ulrika, et al.
Published: (2003) -
Challenges with Incident Management : In Information Technology
by: Isaksson, Ulrika, et al.
Published: (2003)