Publication | Closed Access
Verification, Validation, and Evaluation in Information Security Risk Management
52
Citations
15
References
2010
Year
ReliabilityInformation Security ManagementEngineeringInformation SecurityRisk ManagementVerificationDesignSecuritySystems EngineeringSecurity AssessmentParticular MethodsSecurity EvaluationEvaluation MethodsSecurity MeasurementCyber-risk ManagementReal-world Example
By surveying verification, validation, and evaluation methods referenced in information security risk management (ISRM) literature, the authors discuss in which ISRM phases particular methods should be applied and demonstrate appropriate methods with a real-world example.
| Year | Citations | |
|---|---|---|
Page 1
Page 1