Development of SecureMet: A Tool for Aligning Security Metrics and Organizations Security Objectives
The purpose of this project is to develop a tool henceforth called SecureMet to help an organization to determine the security metrics aligned with its security objectives based on the organization’s capabilities. The majority of organizations face a common problem in determining their security metr...
| Auteur principal: | Noraini, Mohd Noor |
|---|---|
| Format: | Thèse |
| Langue: | anglais anglais |
| Publié: |
2011
|
| Sujets: | |
| Accès en ligne: | https://etd.uum.edu.my/2919/1/Noraini_Mohd_Noor.pdf https://etd.uum.edu.my/2919/2/1.Noraini_Mohd_Noor.pdf |
Documents similaires
Systematic secure design guideline to improve integrity and availability of system security
par: Krishnan, Ashvini Devi
Publié: (2013)
par: Krishnan, Ashvini Devi
Publié: (2013)
Developing Cost And Risk Assessment Tool For Hybrid Approach In Information Security Risk Analysis
par: Mohd Zabawi, Ahmed Yaser
Publié: (2019)
par: Mohd Zabawi, Ahmed Yaser
Publié: (2019)
The analysis and development of secure software assessment model (SSAM)
par: Apau, Mohd. Nazer
Publié: (2007)
par: Apau, Mohd. Nazer
Publié: (2007)
Factors influencing security measures in IT outsourcing
par: Zainal, Mohd. Zairusham
Publié: (2014)
par: Zainal, Mohd. Zairusham
Publié: (2014)
Secure software development practice selection model
par: Kanniah, Sri Lakshmi
Publié: (2020)
par: Kanniah, Sri Lakshmi
Publié: (2020)
Value focused assessment of information system security
par: Asadi, Saman
Publié: (2014)
par: Asadi, Saman
Publié: (2014)
Secure cloud storage model to preserve confidentiality and integrity
par: Brohi, Sarfraz Nawaz
Publié: (2015)
par: Brohi, Sarfraz Nawaz
Publié: (2015)
Testing and bug fixing of the information security management system
par: Vahdani, Omid
Publié: (2012)
par: Vahdani, Omid
Publié: (2012)
Comprehensive analysis on the influences of computer ethics on information security
par: Abdul Rahim, Fiza
Publié: (2009)
par: Abdul Rahim, Fiza
Publié: (2009)
Information security awareness model in social networking for teenagers
par: Mohamed Khazin, Mohamed Zul Hazmi
Publié: (2015)
par: Mohamed Khazin, Mohamed Zul Hazmi
Publié: (2015)
Testing information security management system tool v2.1.1.0 based on ISO 27001:2005
par: Shehu, Abdulrahman Mustafa
Publié: (2012)
par: Shehu, Abdulrahman Mustafa
Publié: (2012)
Secure System Development with UMLSEC : Application to a B2B System
par: Khairul Anwar, Sedek
Publié: (2004)
par: Khairul Anwar, Sedek
Publié: (2004)
An anti-malvertising model for university students to increase security awareness
par: Noorlaily Izwana Ibrahim
Publié: (2012)
par: Noorlaily Izwana Ibrahim
Publié: (2012)
A secure map based graphical-password auhentication system
par: Alhebshi, Ebrahim
Publié: (2014)
par: Alhebshi, Ebrahim
Publié: (2014)
An index based searchable encryption scheme with IND-CCA security
par: Nateghizad, Majid
Publié: (2014)
par: Nateghizad, Majid
Publié: (2014)
Developing secure android application with encrypted database file using sqlcipher
par: Rachmawan, Ardiansa
Publié: (2014)
par: Rachmawan, Ardiansa
Publié: (2014)
Information security risk management awareness in e-government outsourced projects
par: Zalehah Muyet
Publié: (2011)
par: Zalehah Muyet
Publié: (2011)
Flat role based access control and encryption scheme for database security
par: Al Farissi, Al Farissi
Publié: (2013)
par: Al Farissi, Al Farissi
Publié: (2013)
A secure method to detect wormhole attack in mobile adhoc network
par: Ardestani, Parichehr Manouchehri
Publié: (2013)
par: Ardestani, Parichehr Manouchehri
Publié: (2013)
An efficient recognition-based graphical password scheme improving security and usability
par: Khodadadi, Touraj
Publié: (2013)
par: Khodadadi, Touraj
Publié: (2013)
Secure virtual lab design and performance testing for the UTM AIS students
par: Abedula, Dhari Kh
Publié: (2013)
par: Abedula, Dhari Kh
Publié: (2013)
Design of new block and stream cipher encryption algorithms for data security
par: Tuan Mat @ Tuan Muhammad, Tuan Sabri
Publié: (2000)
par: Tuan Mat @ Tuan Muhammad, Tuan Sabri
Publié: (2000)
Readiness of local authorities in implementing information security management system (ISMS)
par: Mohd. Esa, Farah Saffarizan
Publié: (2014)
par: Mohd. Esa, Farah Saffarizan
Publié: (2014)
Enhancement of task oriented maintenance model using secure software desgin maintenence
par: Abdulrazak, Essa Zaki
Publié: (2013)
par: Abdulrazak, Essa Zaki
Publié: (2013)
Client to client attacks protection in cloud computing by a secure virtualization model
par: Abadi, Ahad Akbar
Publié: (2013)
par: Abadi, Ahad Akbar
Publié: (2013)
A model to enhance security of live virtual machine migration in cloud computing
par: Hosseini, Kambiz Mohammad
Publié: (2013)
par: Hosseini, Kambiz Mohammad
Publié: (2013)
Operation management system for security department of Universiti Teknologi Malaysia(OMS-UTMSD)
par: Alfalet, Mohamed O. Ali
Publié: (2007)
par: Alfalet, Mohamed O. Ali
Publié: (2007)
Information security vulnerability in an Iranian context from human perspective(electrical industry)
par: Pouransafar, Malahat
Publié: (2013)
par: Pouransafar, Malahat
Publié: (2013)
An information security awareness model for financial management infiormation system (FMIS) in Sudan
par: Mahmoud, Suliman Mohamed
Publié: (2014)
par: Mahmoud, Suliman Mohamed
Publié: (2014)
Assessing cloud computing security level of awareness among IT and non IT students in UTM
par: Mohammed, Alwuhayd Muteb
Publié: (2014)
par: Mohammed, Alwuhayd Muteb
Publié: (2014)
The Implementation of Securing Plaintext File Using Cryptography Method in Web Based Environment
par: Hasnira, Md. Lazim
Publié: (2004)
par: Hasnira, Md. Lazim
Publié: (2004)
A press touch code based secure graphical password scheme for smart devices
par: Al Noman Ranak, Md Sayfullah
Publié: (2018)
par: Al Noman Ranak, Md Sayfullah
Publié: (2018)
A secure method against frequency attack for pattern query on encrypted string data
par: Ravan, Rama Roshan
Publié: (2013)
par: Ravan, Rama Roshan
Publié: (2013)
Evaluation of user's behaviours handling computer security incident in financial institution in Klang Valley
par: Nor Hidayah Mohd Jawawi
Publié: (2012)
par: Nor Hidayah Mohd Jawawi
Publié: (2012)
Guidelines for improving security awareness courses in technical and vocational training corporation in Saudi Arabia
par: Almalki, Hassan Mohammed
Publié: (2014)
par: Almalki, Hassan Mohammed
Publié: (2014)
Simulation on Network Security Design Architecture for Server Room in Rwanda Information Technology Agency
par: Eric, Karerangabo
Publié: (2009)
par: Eric, Karerangabo
Publié: (2009)
The Challenges Of Understanding Security In Web Browser Case Study: Internet Explorer And Mozilla Firefox
par: Saleh, Ashraf Mousa
Publié: (2008)
par: Saleh, Ashraf Mousa
Publié: (2008)
Comparing the Vulnerability of Password Security on Windows XP Profesional and Red Hat Linux 9
par: Norkhushaini, Awang
Publié: (2004)
par: Norkhushaini, Awang
Publié: (2004)
Generic nodal abstraction for enhancing human-agent collaborative model with an integrated security and trust aspects
par: Mohammed, Khudair Abbas
Publié: (2019)
par: Mohammed, Khudair Abbas
Publié: (2019)
A secure virtualization model for cloud computing to defend against distributed denial-of service attacks
par: Farahmandian, Sara
Publié: (2013)
par: Farahmandian, Sara
Publié: (2013)
Documents similaires
-
Systematic secure design guideline to improve integrity and availability of system security
par: Krishnan, Ashvini Devi
Publié: (2013) -
Developing Cost And Risk Assessment Tool For Hybrid Approach In Information Security Risk Analysis
par: Mohd Zabawi, Ahmed Yaser
Publié: (2019) -
The analysis and development of secure software assessment model (SSAM)
par: Apau, Mohd. Nazer
Publié: (2007) -
Factors influencing security measures in IT outsourcing
par: Zainal, Mohd. Zairusham
Publié: (2014) -
Secure software development practice selection model
par: Kanniah, Sri Lakshmi
Publié: (2020)