Development of SecureMet: A Tool for Aligning Security Metrics and Organizations Security Objectives
The purpose of this project is to develop a tool henceforth called SecureMet to help an organization to determine the security metrics aligned with its security objectives based on the organization’s capabilities. The majority of organizations face a common problem in determining their security metr...
| Main Author: | Noraini, Mohd Noor |
|---|---|
| Format: | Thesis |
| Language: | English English |
| Published: |
2011
|
| Subjects: | |
| Online Access: | https://etd.uum.edu.my/2919/1/Noraini_Mohd_Noor.pdf https://etd.uum.edu.my/2919/2/1.Noraini_Mohd_Noor.pdf |
Similar Items
Systematic secure design guideline to improve integrity and availability of system security
by: Krishnan, Ashvini Devi
Published: (2013)
by: Krishnan, Ashvini Devi
Published: (2013)
Developing Cost And Risk Assessment Tool For Hybrid Approach In Information Security Risk Analysis
by: Mohd Zabawi, Ahmed Yaser
Published: (2019)
by: Mohd Zabawi, Ahmed Yaser
Published: (2019)
The analysis and development of secure software assessment model (SSAM)
by: Apau, Mohd. Nazer
Published: (2007)
by: Apau, Mohd. Nazer
Published: (2007)
Factors influencing security measures in IT outsourcing
by: Zainal, Mohd. Zairusham
Published: (2014)
by: Zainal, Mohd. Zairusham
Published: (2014)
Secure software development practice selection model
by: Kanniah, Sri Lakshmi
Published: (2020)
by: Kanniah, Sri Lakshmi
Published: (2020)
Value focused assessment of information system security
by: Asadi, Saman
Published: (2014)
by: Asadi, Saman
Published: (2014)
Secure cloud storage model to preserve confidentiality and integrity
by: Brohi, Sarfraz Nawaz
Published: (2015)
by: Brohi, Sarfraz Nawaz
Published: (2015)
Testing and bug fixing of the information security management system
by: Vahdani, Omid
Published: (2012)
by: Vahdani, Omid
Published: (2012)
Comprehensive analysis on the influences of computer ethics on information security
by: Abdul Rahim, Fiza
Published: (2009)
by: Abdul Rahim, Fiza
Published: (2009)
Information security awareness model in social networking for teenagers
by: Mohamed Khazin, Mohamed Zul Hazmi
Published: (2015)
by: Mohamed Khazin, Mohamed Zul Hazmi
Published: (2015)
Testing information security management system tool v2.1.1.0 based on ISO 27001:2005
by: Shehu, Abdulrahman Mustafa
Published: (2012)
by: Shehu, Abdulrahman Mustafa
Published: (2012)
Secure System Development with UMLSEC : Application to a B2B System
by: Khairul Anwar, Sedek
Published: (2004)
by: Khairul Anwar, Sedek
Published: (2004)
An anti-malvertising model for university students to increase security awareness
by: Noorlaily Izwana Ibrahim
Published: (2012)
by: Noorlaily Izwana Ibrahim
Published: (2012)
A secure map based graphical-password auhentication system
by: Alhebshi, Ebrahim
Published: (2014)
by: Alhebshi, Ebrahim
Published: (2014)
An index based searchable encryption scheme with IND-CCA security
by: Nateghizad, Majid
Published: (2014)
by: Nateghizad, Majid
Published: (2014)
Developing secure android application with encrypted database file using sqlcipher
by: Rachmawan, Ardiansa
Published: (2014)
by: Rachmawan, Ardiansa
Published: (2014)
Information security risk management awareness in e-government outsourced projects
by: Zalehah Muyet
Published: (2011)
by: Zalehah Muyet
Published: (2011)
Flat role based access control and encryption scheme for database security
by: Al Farissi, Al Farissi
Published: (2013)
by: Al Farissi, Al Farissi
Published: (2013)
A secure method to detect wormhole attack in mobile adhoc network
by: Ardestani, Parichehr Manouchehri
Published: (2013)
by: Ardestani, Parichehr Manouchehri
Published: (2013)
An efficient recognition-based graphical password scheme improving security and usability
by: Khodadadi, Touraj
Published: (2013)
by: Khodadadi, Touraj
Published: (2013)
Secure virtual lab design and performance testing for the UTM AIS students
by: Abedula, Dhari Kh
Published: (2013)
by: Abedula, Dhari Kh
Published: (2013)
Design of new block and stream cipher encryption algorithms for data security
by: Tuan Mat @ Tuan Muhammad, Tuan Sabri
Published: (2000)
by: Tuan Mat @ Tuan Muhammad, Tuan Sabri
Published: (2000)
Readiness of local authorities in implementing information security management system (ISMS)
by: Mohd. Esa, Farah Saffarizan
Published: (2014)
by: Mohd. Esa, Farah Saffarizan
Published: (2014)
Enhancement of task oriented maintenance model using secure software desgin maintenence
by: Abdulrazak, Essa Zaki
Published: (2013)
by: Abdulrazak, Essa Zaki
Published: (2013)
Client to client attacks protection in cloud computing by a secure virtualization model
by: Abadi, Ahad Akbar
Published: (2013)
by: Abadi, Ahad Akbar
Published: (2013)
A model to enhance security of live virtual machine migration in cloud computing
by: Hosseini, Kambiz Mohammad
Published: (2013)
by: Hosseini, Kambiz Mohammad
Published: (2013)
Operation management system for security department of Universiti Teknologi Malaysia(OMS-UTMSD)
by: Alfalet, Mohamed O. Ali
Published: (2007)
by: Alfalet, Mohamed O. Ali
Published: (2007)
Information security vulnerability in an Iranian context from human perspective(electrical industry)
by: Pouransafar, Malahat
Published: (2013)
by: Pouransafar, Malahat
Published: (2013)
An information security awareness model for financial management infiormation system (FMIS) in Sudan
by: Mahmoud, Suliman Mohamed
Published: (2014)
by: Mahmoud, Suliman Mohamed
Published: (2014)
Assessing cloud computing security level of awareness among IT and non IT students in UTM
by: Mohammed, Alwuhayd Muteb
Published: (2014)
by: Mohammed, Alwuhayd Muteb
Published: (2014)
The Implementation of Securing Plaintext File Using Cryptography Method in Web Based Environment
by: Hasnira, Md. Lazim
Published: (2004)
by: Hasnira, Md. Lazim
Published: (2004)
A press touch code based secure graphical password scheme for smart devices
by: Al Noman Ranak, Md Sayfullah
Published: (2018)
by: Al Noman Ranak, Md Sayfullah
Published: (2018)
A secure method against frequency attack for pattern query on encrypted string data
by: Ravan, Rama Roshan
Published: (2013)
by: Ravan, Rama Roshan
Published: (2013)
Evaluation of user's behaviours handling computer security incident in financial institution in Klang Valley
by: Nor Hidayah Mohd Jawawi
Published: (2012)
by: Nor Hidayah Mohd Jawawi
Published: (2012)
Guidelines for improving security awareness courses in technical and vocational training corporation in Saudi Arabia
by: Almalki, Hassan Mohammed
Published: (2014)
by: Almalki, Hassan Mohammed
Published: (2014)
Simulation on Network Security Design Architecture for Server Room in Rwanda Information Technology Agency
by: Eric, Karerangabo
Published: (2009)
by: Eric, Karerangabo
Published: (2009)
The Challenges Of Understanding Security In Web Browser Case Study: Internet Explorer And Mozilla Firefox
by: Saleh, Ashraf Mousa
Published: (2008)
by: Saleh, Ashraf Mousa
Published: (2008)
Comparing the Vulnerability of Password Security on Windows XP Profesional and Red Hat Linux 9
by: Norkhushaini, Awang
Published: (2004)
by: Norkhushaini, Awang
Published: (2004)
Generic nodal abstraction for enhancing human-agent collaborative model with an integrated security and trust aspects
by: Mohammed, Khudair Abbas
Published: (2019)
by: Mohammed, Khudair Abbas
Published: (2019)
A secure virtualization model for cloud computing to defend against distributed denial-of service attacks
by: Farahmandian, Sara
Published: (2013)
by: Farahmandian, Sara
Published: (2013)
Similar Items
-
Systematic secure design guideline to improve integrity and availability of system security
by: Krishnan, Ashvini Devi
Published: (2013) -
Developing Cost And Risk Assessment Tool For Hybrid Approach In Information Security Risk Analysis
by: Mohd Zabawi, Ahmed Yaser
Published: (2019) -
The analysis and development of secure software assessment model (SSAM)
by: Apau, Mohd. Nazer
Published: (2007) -
Factors influencing security measures in IT outsourcing
by: Zainal, Mohd. Zairusham
Published: (2014) -
Secure software development practice selection model
by: Kanniah, Sri Lakshmi
Published: (2020)