By Topic

Choosing a Security Option: The InfoSecure Methodology

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Pfleeger, S.L. ; RAND Corp., Santa Monica, CA ; Ciszek, T.

A four-step process can help organizations evaluate assets to be protected, potential assailants, and likely methods and tactics. It then pulls the results together as a plan of action for investing in cybersecurity in ways that protect the most critical organizational information and processes.

Published in:

IT Professional  (Volume:10 ,  Issue: 5 )