2016 SAI Computing Conference (SAI) 2016
DOI: 10.1109/sai.2016.7555979
|View full text |Cite
|
Sign up to set email alerts
|

Fuzzy based modeling for an effective IT security policy management

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 10 publications
0
1
0
Order By: Relevance
“…They suggested a variety of security mechanisms, including data encryption, access control, unauthorized users being blocked by a trusted third party, authentication techniques such as identification names and passwords, network traffic being monitored via firewalls, Intrusion Detection systems (IDs) and prevention systems, and antivirus software. Subramanian and Kumar [56] presented an information policy for various organizations, including updates for antivirus software, data and router backups, unwanted file cleanup, and mail backup and maintenance.…”
Section: Information Security Policiesmentioning
confidence: 99%
“…They suggested a variety of security mechanisms, including data encryption, access control, unauthorized users being blocked by a trusted third party, authentication techniques such as identification names and passwords, network traffic being monitored via firewalls, Intrusion Detection systems (IDs) and prevention systems, and antivirus software. Subramanian and Kumar [56] presented an information policy for various organizations, including updates for antivirus software, data and router backups, unwanted file cleanup, and mail backup and maintenance.…”
Section: Information Security Policiesmentioning
confidence: 99%