Information security baselines
Abstract
Describes a set of “baseline” threats and presents the reasoning behind the “baseline” security approach. Discusses an example of the acceptance of the security baseline approach and suggests the way in which it can be used. Describes the advantages and disadvantages of the approach and concludes that a baseline approach is worthy of consideration as a way forward.
Keywords
Citation
Fitzgerald, K.J. (1995), "Information security baselines", Information Management & Computer Security, Vol. 3 No. 2, pp. 8-12. https://doi.org/10.1108/09685229510088575
Publisher
:MCB UP Ltd
Copyright © 1995, MCB UP Limited