Threat description for the PP by using the concept of the assets protected by TOE
ICCS'03 Proceedings of the 2003 international conference on Computational science
Intelligent method for building security countermeasures
KES'06 Proceedings of the 10th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part II
A relationship between products evaluation and IT systems assurance
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part I
International Journal of Information Management: The Journal for Information Professionals
Hi-index | 0.00 |
The developers of the security policy should recognize the importance of building security countermeasures by using both technical and non-technical methods, such as personnel and operational facts. Security countermeasures may be made for formulating an effective overall security solution to address threats at all layers of the information infrastructure. This paper uses the security engineering principles for determining appropriate technical security countermeasures. It includes information on threats, security services, robustness strategy, and security mechanism. This paper proposes a countermeasure design flow that may reduce the threats to the information systems.