2016
DOI: 10.1007/978-1-4842-1685-9
|View full text |Cite
|
Sign up to set email alerts
|

Practical Information Security Management

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0
1

Year Published

2020
2020
2021
2021

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 0 publications
0
1
0
1
Order By: Relevance
“…Current technologies such cloud computing facilitates the process of CK, however it implies to be more exposed to technological threats. At this extra-collaborative level, all the entities involved in a CK process should guarantee and protect the confidentiality, availability, and integrity of the knowledge [60].…”
Section: Trust/technologicalmentioning
confidence: 99%
“…Current technologies such cloud computing facilitates the process of CK, however it implies to be more exposed to technological threats. At this extra-collaborative level, all the entities involved in a CK process should guarantee and protect the confidentiality, availability, and integrity of the knowledge [60].…”
Section: Trust/technologicalmentioning
confidence: 99%
“…Процесс управления рисками ИБ состоит из нескольких этапов [2,3]. На наш взгляд самым важным этапом является оценка риска Существует два основных способа оценки риска ИБ -количественный [4] и качественный [5,6].…”
Section: Introductionunclassified