Skip to main content

Information security baselines

Buy Article:

$54.08 plus tax (Refund Policy)


Describes a set of "baseline" threats and presents the reasoning behind the "baseline" security approach. Discusses an example of the acceptance of the security baseline approach and suggests the way in which it can be used. Describes the advantages and disadvantages of the approach and concludes that a baseline approach is worthy of consideration as a way forward.

Keywords: Computer Networks; Data Security; Information Technology

Document Type: Research Article


Publication date: 1995-02-01

  • Access Key
  • Free ContentFree content
  • Partial Free ContentPartial Free content
  • New ContentNew content
  • Open Access ContentOpen access content
  • Partial Open Access ContentPartial Open access content
  • Subscribed ContentSubscribed content
  • Partial Subscribed ContentPartial Subscribed content
  • Free Trial ContentFree trial content
Cookie Policy
Cookie Policy
Ingenta Connect website makes use of cookies so as to keep track of data that you have filled in. I am Happy with this Find out more