2013
DOI: 10.4018/ijcwt.2013070103
|View full text |Cite
|
Sign up to set email alerts
|

Information Security Management

Abstract: The authors present a Case Study conducted in a Portuguese military organization, to answer the following research questions: (1) what are the most relevant dimensions and categories of information security controls applied in military organizations? (2) What are the main scenarios of information security incidents that are expected to occur? (3) What is the decision process used for planning and selection information security controls? This study reveals that: (1) information security within the military orga… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2014
2014
2014
2014

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(3 citation statements)
references
References 14 publications
0
3
0
Order By: Relevance
“…ganizations to develop, improve, and document their own information security management systems, to be compliant with ISO/IEC 27001 or other standards. Martins et al (2013) conducted a case study of applying ISO/IEC 27001 in a military context. In the further research, Martins et al (2014) proposed a method for the identification of the best combination of security controls to be applied against a particular method of attack.…”
Section: Additional Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…ganizations to develop, improve, and document their own information security management systems, to be compliant with ISO/IEC 27001 or other standards. Martins et al (2013) conducted a case study of applying ISO/IEC 27001 in a military context. In the further research, Martins et al (2014) proposed a method for the identification of the best combination of security controls to be applied against a particular method of attack.…”
Section: Additional Resultsmentioning
confidence: 99%
“…Martins et al (2013) conducted a case study of applying ISO/IEC 27001 in a military context. In the further research, Martins et al (2014) proposed a method for the identification of the best combination of security controls to be applied against a particular method of attack. The method takes into account, among other topics, existing security control frameworks, like ISO/IEC 27001, and lessons learned.…”
Section: Additional Resultsmentioning
confidence: 99%
See 1 more Smart Citation