Concepedia

Publication | Closed Access

Verification, Validation, and Evaluation in Information Security Risk Management

52

Citations

15

References

2010

Year

Abstract

By surveying verification, validation, and evaluation methods referenced in information security risk management (ISRM) literature, the authors discuss in which ISRM phases particular methods should be applied and demonstrate appropriate methods with a real-world example.

References

YearCitations

Page 1