Mardjan et al., 2019 - Google Patents
Open Reference Architecture for Security and Privacy DocumentationMardjan et al., 2019
View PDF- Document ID
- 13347758535235293375
- Author
- Mardjan M
- Jahan A
- Publication year
- Publication venue
- Abgerufen von https://buildmedia. readthedocs. org/media/pdf/security-and-privacy-reference-architecture/latest/security-andprivacy-reference-architecture. pdf
External Links
Snippet
In our opinion security is a process, not a destination to arrive at. Good security design and implementation takes time, patience and hard work to achieve and maintain. You should always start with the basics by creating an architecture or overall design. As security and …
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Matulevičius | Fundamentals of secure system modelling | |
Silowash et al. | Common sense guide to mitigating insider threats | |
Salini et al. | Survey and analysis on security requirements engineering | |
Kalloniatis et al. | Towards the design of secure and privacy-oriented information systems in the cloud: Identifying the major concepts | |
Goodenough et al. | Toward a theory of assurance case confidence | |
Death | Information security handbook: develop a threat model and incident response strategy to build a strong information security framework | |
Silowash et al. | Common sense guide to mitigating insider threats 4th edition | |
Paul | Official (ISC) 2 Guide to the CSSLP | |
De Faveri et al. | Multi-paradigm deception modeling for cyber defense | |
Beissel | Cybersecurity investments: Decision support under economic aspects | |
Bailey | Self-adaptive Authorisation Infrastructures | |
Tounsi | Cyber-Vigilance and Digital Trust: Cyber Security in the Era of Cloud Computing and IoT | |
Paul | Official (ISC) 2 guide to the CSSLP CBK | |
Williams | Secure software lifecycle knowledge area issue | |
Mardjan et al. | Open Reference Architecture for Security and Privacy Documentation | |
Tytarenko | Selection of the best security controls for rapid development of enterprise-level cyber security | |
Reichert et al. | Software supply chain security: a systematic literature review | |
Niemann | Enterprise architecture management and its role in IT governance and IT investment planning | |
King | Bring your own device security awareness and security behavior: a quantitative explanatory study | |
Kangwa | Prevention of personally identifiable information leakage in ecommerce using offline data minimization and online pseudonymisation. | |
Vasudevan et al. | Application security in the ISO27001: 2013 Environment | |
Williams | Secure Software Lifecycle Knowledge Area Version.. | |
Jawed | Continuous security in DevOps environment: Integrating automated security checks at each stage of continuous deployment pipeline | |
Ros | Digital forensic readiness in mobile device management systems | |
Udayakumar | Design and Deploy a Detect Solution |