Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06) 2006
DOI: 10.1109/hicss.2006.133
|View full text |Cite
|
Sign up to set email alerts
|

e-Government and Cyber Security: The Role of Cyber Security Exercises

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
18
0

Year Published

2009
2009
2018
2018

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 35 publications
(18 citation statements)
references
References 3 publications
0
18
0
Order By: Relevance
“…We have group the security threads into ive groups that will be described later. First, in the top layer, we present the origin of the threats [7,8]. Threads can have three main origins, which are as follows:…”
Section: Modeling Robot Cybersecurity Threatsmentioning
confidence: 99%
“…We have group the security threads into ive groups that will be described later. First, in the top layer, we present the origin of the threats [7,8]. Threads can have three main origins, which are as follows:…”
Section: Modeling Robot Cybersecurity Threatsmentioning
confidence: 99%
“…In a paper by Conklin and White, issues surrounding egovernment security are reviewed and then tested in security exercises [7] . The authors discuss the primary motivations for information security as confidentiality, integrity, and availability (CIA) [7] .…”
Section: Security In Practicementioning
confidence: 99%
“…The authors discuss the primary motivations for information security as confidentiality, integrity, and availability (CIA) [7] . Information security managers must ensure confidentiality of information by only providing access to data by authorized parties [7] .…”
Section: Security In Practicementioning
confidence: 99%
See 2 more Smart Citations