Fundamentals of computer security technology
Fundamentals of computer security technology
Internet security for business
Internet security for business
Intrusion detection: network security beyond the firewall
Intrusion detection: network security beyond the firewall
Computer security
Security Engineering: A Guide to Building Dependable Distributed Systems
Security Engineering: A Guide to Building Dependable Distributed Systems
IPSec: The New Security Standard for the Internet, Intranets, and Virtual Private Networks
IPSec: The New Security Standard for the Internet, Intranets, and Virtual Private Networks
Computer Security Handbook
Fundamentals of Computer Security
Fundamentals of Computer Security
PKI: Implementing and Managing E-Security
PKI: Implementing and Managing E-Security
Developing an enterprise information security policy
SIGUCCS '02 Proceedings of the 30th annual ACM SIGUCCS conference on User services
Strategic Planning for Expert Systems
IEEE Expert: Intelligent Systems and Their Applications
Development of security policies for private networks
International Journal of Network Management
IEEE Security and Privacy
Why Information Security is Hard-An Economic Perspective
ACSAC '01 Proceedings of the 17th Annual Computer Security Applications Conference
How to Systematically Classify Computer Security Intrusions
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
Digital Evidence and Computer Crime
Digital Evidence and Computer Crime
Computer Security in the Real World
Computer
ACM SIGMIS Database
Defending against internet worms
Defending against internet worms
Corporate Computer and Network Security
Corporate Computer and Network Security
ICCGI '07 Proceedings of the International Multi-Conference on Computing in the Global Information Technology
On the importance of securing telephony systems
WSEAS TRANSACTIONS on COMMUNICATIONS
Hi-index | 0.00 |
The necessity of the companies and organizations to adapt the technological changes of the computer science takes to formulated key questions: How to measure the security of my organization?, What type of Computer Science Security needs my company, financial organization, or government? Did my financial organization counts with aspects of computer science security in the correct areas? What new tools of computer science security exist? What security strategies we must follow? What is the data stream of information that needs to be transmitted through the different departments of my organization, in terms of computer security? What kind of users' roles exists in terms of organizational security? Is there a way to classify the information in terms of computer security? In this paper we show a methodology for strategic planning for the computer science security of diverse companies like Banks and Government, cradle in the concepts of strategic administration of enterprise politics, which tries to give answers to the questions before mentioned.