Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleOctober 2004
Teaching security best practices by architecting and administering an IT security lab
CITC5 '04: Proceedings of the 5th conference on Information technology educationPages 182–187https://doi.org/10.1145/1029533.1029578Information Assurance(IA) can be learned by actively being involved in the "doing" process. Students within a university setting have architected, installed and administered a security lab. The value and need for security <i>best practices</i> becomes ...
- ArticleJune 1997
A Proposed Security Management Framework for the Global Information Community
WET-ICE '97: Proceedings of the 6th Workshop on Enabling Technologies on Infrastructure for Collaborative EnterprisesPages 220–227Abstract: A proposal is made for the definition, functions, architecture, and components of security management. The proposal addresses the need for security management from the perspectives of the security administrator, the security architect, and the ...