Maturity level assessments of information security controls: An empirical analysis of practitioners assessment capabilities
Maturity models are a widely used concept for measuring information security. The idea is to
systematically evaluate the maturity of security-relevant processes in an organisation. This …
systematically evaluate the maturity of security-relevant processes in an organisation. This …
LiSRA: Lightweight Security Risk Assessment for decision support in information security
Abstract Information security risk assessment frameworks support decision-makers in
assessing and understanding the risks their organisation is exposed to. However, there is a …
assessing and understanding the risks their organisation is exposed to. However, there is a …
Intelligence in security countermeasures selection
S Tamjidi, A Shameli-Sendi - Journal of Computer Virology and Hacking …, 2023 - Springer
Identifying security risks in organizations and also determining their severity in order to
select appropriate security countermeasures is of great importance in organizations. In the …
select appropriate security countermeasures is of great importance in organizations. In the …
[PDF][PDF] On the use of information security management systems by German energy providers
Along with other requirements, the German critical infrastructure programme required critical
infrastructure providers, ie energy providers to implement an ISMS. We used the unique …
infrastructure providers, ie energy providers to implement an ISMS. We used the unique …
[PDF][PDF] Security Requirements and Risks Conceptualization
VTT Lead - pape.science
This document presents the research results on usable security and privacy, and on usability
of different security solutions, that were acquired in the context of Cyber Security for Europe …
of different security solutions, that were acquired in the context of Cyber Security for Europe …
[PDF][PDF] A Lightweight Tool for Measuring the Impact of IT Security Controls in Critical Infrastructures
IT security is a cost-intensive aspect of SMEs. Critical infrastructures, in particular, are
increasingly dependent on good IT security. Increasing security, however, can limit the …
increasingly dependent on good IT security. Increasing security, however, can limit the …