Development of SecureMet: A Tool for Aligning Security Metrics and Organizations Security Objectives
The purpose of this project is to develop a tool henceforth called SecureMet to help an organization to determine the security metrics aligned with its security objectives based on the organization’s capabilities. The majority of organizations face a common problem in determining their security metr...
| Main Author: | Noraini, Mohd Noor |
|---|---|
| Format: | Thesis |
| Language: | English English |
| Published: |
2011
|
| Subjects: | |
| Online Access: | https://etd.uum.edu.my/2919/1/Noraini_Mohd_Noor.pdf https://etd.uum.edu.my/2919/2/1.Noraini_Mohd_Noor.pdf https://etd.uum.edu.my/2919/ |
| Abstract | Abstract here |
Similar Items
Developing Cost And Risk Assessment Tool For Hybrid Approach In Information Security Risk Analysis
by: Mohd Zabawi, Ahmed Yaser
Published: (2019)
by: Mohd Zabawi, Ahmed Yaser
Published: (2019)
Secure System Development with UMLSEC : Application to a B2B System
by: Khairul Anwar, Sedek
Published: (2004)
by: Khairul Anwar, Sedek
Published: (2004)
Developing secure android application with encrypted database file using sqlcipher
by: Rachmawan, Ardiansa
Published: (2014)
by: Rachmawan, Ardiansa
Published: (2014)
A secure HEVC video watermarking scheme for authentication and copyright purposes
by: Elrowayati, Ali Abdulhafid
Published: (2020)
by: Elrowayati, Ali Abdulhafid
Published: (2020)
A secure message handler using microsoft cryptoapi
by: Eh Kan, Chessda Uttraphan
Published: (2003)
by: Eh Kan, Chessda Uttraphan
Published: (2003)
An investigation of health information system security policies compliance behaviour / Norshima Humaidi
by: Norshima, Humaidi
Published: (2016)
by: Norshima, Humaidi
Published: (2016)
The Implementation of Securing Plaintext File Using Cryptography Method in Web Based Environment
by: Hasnira, Md. Lazim
Published: (2004)
by: Hasnira, Md. Lazim
Published: (2004)
Securing cloud data system (SCDS) for key exposure using AES algorithm
by: Thabet Albatol, Mohammed Samer Hasan
Published: (2021)
by: Thabet Albatol, Mohammed Samer Hasan
Published: (2021)
A press touch code based secure graphical password scheme for smart devices
by: Al Noman Ranak, Md Sayfullah
Published: (2018)
by: Al Noman Ranak, Md Sayfullah
Published: (2018)
Comparing the Vulnerability of Password Security on Windows XP Profesional and Red Hat Linux 9
by: Norkhushaini, Awang
Published: (2004)
by: Norkhushaini, Awang
Published: (2004)
Information security risk management framework for Social Engineering attack and digital prevention techniques
by: Shekh Abdullah -Al-Musa Ahmed
Published: (2020)
by: Shekh Abdullah -Al-Musa Ahmed
Published: (2020)
Simulation on Network Security Design Architecture for Server Room in Rwanda Information Technology Agency
by: Eric, Karerangabo
Published: (2009)
by: Eric, Karerangabo
Published: (2009)
The Challenges Of Understanding Security In Web Browser Case Study: Internet Explorer And Mozilla Firefox
by: Saleh, Ashraf Mousa
Published: (2008)
by: Saleh, Ashraf Mousa
Published: (2008)
Web transcript verification using dual check digit as secure number
by: Abd Halim, Muhamad Rais
Published: (2016)
by: Abd Halim, Muhamad Rais
Published: (2016)
Generic nodal abstraction for enhancing human-agent collaborative model with an integrated security and trust aspects
by: Mohammed, Khudair Abbas
Published: (2019)
by: Mohammed, Khudair Abbas
Published: (2019)
Evaluation of Information Security Risks of E-Learning Systems: A Case Study on UUM Learning Zone
by: Tan, Wai Beng
Published: (2011)
by: Tan, Wai Beng
Published: (2011)
Security Issues In Shared Key Authentication on IEEE 802.11 Wireless Standards and UUM Wireless Network.
by: El Omari, Abdullah Abdelmonem M.
Published: (2007)
by: El Omari, Abdullah Abdelmonem M.
Published: (2007)
A comparison of CK and Martin's package metric suites in predicting reusability in open source object-oriented software
by: Alhadi Meftah, Khaled
Published: (2016)
by: Alhadi Meftah, Khaled
Published: (2016)
A Template-Based Approach To Write Complete Security Requirements For Software Development Environment
by: Mustafa, Nuridawati
Published: (2020)
by: Mustafa, Nuridawati
Published: (2020)
Identify Human Error In Using Mobile Device That Lead To Security Threat
by: Abdul Mubin, Norzul Masri
Published: (2017)
by: Abdul Mubin, Norzul Masri
Published: (2017)
A Framework For Classification Software Security Using Common Vulnerabilities And Exposures
by: Hassan, Nor Hafeizah
Published: (2018)
by: Hassan, Nor Hafeizah
Published: (2018)
Lightweight security schemes for internet of things resource-constrained devices / Usman Ali
by: Usman , Ali
Published: (2024)
by: Usman , Ali
Published: (2024)
Automated intrusion prevention mechanism in enhancing network security / He Xiao Dong
by: He , Xiao Dong
Published: (2008)
by: He , Xiao Dong
Published: (2008)
Secure Trust-Based Algorithm using Blockchain Technology to Prevent Attacks in VANET
by: Kuhanraj, Balan
Published: (2020)
by: Kuhanraj, Balan
Published: (2020)
E-commerce solution for electronic tendering system using secure electronic transaction / Mazlina Abdul Majid
by: Mazlina , Abdul Majid
Published: (2004)
by: Mazlina , Abdul Majid
Published: (2004)
Dynamic remote data auditing for securing big data storage in cloud computing / Mehdi Sookhak
by: Sookhak, Mehdi
Published: (2015)
by: Sookhak, Mehdi
Published: (2015)
Social cognitive framework for secure information sharing on Islamic NGO social media / Nurul’Adilah Nazri
by: Nurul’Adilah , Nazri
Published: (2022)
by: Nurul’Adilah , Nazri
Published: (2022)
Systematic secure design guideline to improve integrity and availability of system security
by: Ashvini Devi Krishnan
Published: (2025)
by: Ashvini Devi Krishnan
Published: (2025)
Web development productivity improvement through object-oriented application framework
by: Mohammad Nuruzzaman, ,
Published: (2014)
by: Mohammad Nuruzzaman, ,
Published: (2014)
Cost Estimation Model for Secure Software Development
by: Sia Abdullah, Nur Atiqah
Published: (2011)
by: Sia Abdullah, Nur Atiqah
Published: (2011)
Learning Objects in Assisting Novice Programmers
by: Suriana, Ismail
Published: (2006)
by: Suriana, Ismail
Published: (2006)
Incorporating Object-Oriented Metrics Into A Reverse Engineering Tool
by: Eshah, Nida Bashir
Published: (2003)
by: Eshah, Nida Bashir
Published: (2003)
Development of Design-Oriented Evaluation Tool : A HCI Perspective
by: Suganthi Naikkar, Subramaniam
Published: (2004)
by: Suganthi Naikkar, Subramaniam
Published: (2004)
I-Personal Financial Organizer (I-Pfo): A Cyber Security Framework For I-Pfo.
by: Annie Ng, Ai Bee
Published: (2010)
by: Annie Ng, Ai Bee
Published: (2010)
Utilization Of Java Reflection In Detecting Object Concept Similarities
by: Tan, Choo Jun
Published: (2000)
by: Tan, Choo Jun
Published: (2000)
Enterprise-Wide Object Model For Life Insurance Industry
by: Tan, Ean Khim
Published: (2001)
by: Tan, Ean Khim
Published: (2001)
Attributes sanitization in object-oriented design to improve database structure
by: Saringat, Mohd Zainuri
Published: (2014)
by: Saringat, Mohd Zainuri
Published: (2014)
Secure software development practice selection model
by: Sri Lakshmi Kanniah
Published: (2025)
by: Sri Lakshmi Kanniah
Published: (2025)
Analysis of Linguistic Steganography Tools
by: Shaifizat, Mansor
Published: (2004)
by: Shaifizat, Mansor
Published: (2004)
Query Performance of CORBA Trading Object Service Using LDAP As Backend Storage
by: Farkhana, Muchtar
Published: (2007)
by: Farkhana, Muchtar
Published: (2007)
Similar Items
-
Developing Cost And Risk Assessment Tool For Hybrid Approach In Information Security Risk Analysis
by: Mohd Zabawi, Ahmed Yaser
Published: (2019) -
Secure System Development with UMLSEC : Application to a B2B System
by: Khairul Anwar, Sedek
Published: (2004) -
Developing secure android application with encrypted database file using sqlcipher
by: Rachmawan, Ardiansa
Published: (2014) -
A secure HEVC video watermarking scheme for authentication and copyright purposes
by: Elrowayati, Ali Abdulhafid
Published: (2020) -
A secure message handler using microsoft cryptoapi
by: Eh Kan, Chessda Uttraphan
Published: (2003)
