Information security baselines
Describes a set of "baseline" threats and presents the reasoning behind the "baseline" security approach. Discusses an example of the acceptance of the security baseline approach and suggests the way in which it can be used. Describes the advantages and disadvantages of the approach and concludes that a baseline approach is worthy of consideration as a way forward.
Keywords: Computer Networks; Data Security; Information Technology
Document Type: Research Article
Publication date: 01 February 1995
- Access Key
- Free content
- Partial Free content
- New content
- Open access content
- Partial Open access content
- Subscribed content
- Partial Subscribed content
- Free trial content