Alberts, C. & Dorofee, A.(2003) Managing Information Security Risks: The OCTAVE Approach. New York: Addison Wesley. This work is a descriptive and yet process-oriented book on the concept of security risk assessment with a specific focus on new risk evaluation methodology, OCTAVE. The term OCTAVE is used to denote f Operationally Critical Threat, Asset, and Vulnerability Evaluation "SM".It is important that organizations conduct a security risk evaluation in order for them to effectively evaluate
Global Information Systems Strategy ELEMICACooperation, Collaboration and Community | | Prepared by: Raphael Hassler Raphael.hassler@hnc.ch Title | : Elemica e-Business Initiative | Prepared for | : Dr. xxx, CEO of Elemica Inc. | Prepared by | : Raphael Hassler, CTO of Elemica Inc. | Date | : 5 June 2011 | | EXECUTIVE SUMMARY This is an in-depth study of Elemica’s existing B2B online business and the report contains the findings and its business potential of achieving
- 1 - Database Security *) GÜNTHER PERNUL Institut für Angewandte Informatik und Informationssysteme Abteilung für Information Engineering Universität Wien Vienna, Austria 1. Introduction 1.1 The Relational Data Model Revisited 1.2 The Vocabulary of Security and Major DB Security Threats 2. Database Security Models 2.1 Discretionary Security Models 2.2 Mandatory Security Models 2.3 Adapted Mandatory Access Control Model 2.4 Personal Knowledge Approach 2.5 Clark and Wilson Model 2