/

GlobalView
  • Change Site
  • GlobalView
  • Research Output
  • Past Exam Papers
  • Special Collections
  • Advanced Search
  • Expert Search
  • Sign In
    • Help
    • Search History
    • Clear Session
  • Browse
    • Entire Repository  
    • Recent Additions
    • Communities & Collections
    • By Title
    • By Creator
    • By Subject
    • By Contributor
    • Most Accessed Papers
    • Most Accessed Items
    • Most Accessed Authors
  • Quick Collection  
Sign In
  • Help
  • Search History
  • Clear Session

MODS Metadata of The identification of information sources to aid with critical information infrastructure protection

roleTerm ( text )
author 
namePart
Mouton, Jean 
roleTerm ( text )
author 
namePart
Ellefsen, Ian 
dateAccessioned
2014-10-13T08:27:57Z 
dateAvailable
2014-10-13T08:27:57Z 
dateIssued
2013 
text
Mouton, Jean & Ellefsen, Ian. 2013. The identification of information sources to aid with critical information infrastructure protection. Information Security for South Africa Conference (ISSA 2013). 
identifier ( uri )
http://hdl.handle.net/10210/12420 
abstract
Providing Critical Information Infrastructure Protection (CIIP) has become an important focus area for countries across the world with the widespread adoption of computer systems and computer networks that handle and transfer large amounts of sensitive information on a daily basis. Most large organisations have their own security teams that provide some form of protection against cyber attacks that are launched by cybercriminals. It is however often the case that smaller stakeholders such as schools, pharmacies and other SMEs might not have the required means to protect themselves against these cyber attacks. The distribution of relevant and focused information is an important part of providing effective protection against cyber attacks. In this paper some of the existing mechanisms and formats in which information related to software security vulnerabilities are provided to the public are discussed and reviewed. Providing focused and relevant information can enable smaller stakeholders such as SMEs that have a limited set of skills and expertise to limit their risk of exposure to cyber attacks. 
languageTerm ( rfc3066 )
en 
publisher
Information Security for South Africa Conference (ISSA 2013) 
accessCondition ( useAndReproduction )
© 2013, Authors 
topic
Critical information infrastructure protection 
topic
Computer security 
title
The identification of information sources to aid with critical information infrastructure protection 
genre
Article 

Permalink

http://hdl.handle.net/10210/187372
  • English (United States)
  • English (United States)
  • Disclaimer
  • Privacy
  • Copyright
  • Contact
  • About Vital

‹ › ×

    Clear Session

    Are you sure you would like to clear your session, including search history and login status?