2020
DOI: 10.37200/ijpr/v24i1/pr200212
|View full text |Cite
|
Sign up to set email alerts
|

An Improved Business Strategy and Analysis of the Information Security Requirements

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 0 publications
0
1
0
Order By: Relevance
“…SG technology enhances the complexity of accessing and managing these facilities, increasing the risk of appropriately assessed and controlled security threats. An example of a Cyber-security Threats model for SGs was proposed [132]. Several SGs guidelines have been addressed on risk management protection, planning flexibility, recognition, evaluation and risk optimization.…”
Section: I-energy Smart Grid Security Systems a Project Risk Manamentioning
confidence: 99%
“…SG technology enhances the complexity of accessing and managing these facilities, increasing the risk of appropriately assessed and controlled security threats. An example of a Cyber-security Threats model for SGs was proposed [132]. Several SGs guidelines have been addressed on risk management protection, planning flexibility, recognition, evaluation and risk optimization.…”
Section: I-energy Smart Grid Security Systems a Project Risk Manamentioning
confidence: 99%