Now showing items 1-2 of 2
Model-based Evaluation: from Dependability Theory to Security
(University of Waterloo, 2013-07-16)
How to quantify security is a classic question in the security community that until today has had no plausible answer. Unfortunately, current security evaluation models are often either quantitative but too specific (i.e., ...
Towards evaluating security implementations using the Information Security Maturity Model (ISMM)
(University of Waterloo, 2007-05-18)
Information security is a common and ever-present concern for both private and public sector organizations. Information security protects information from a wide range of threats, risks, and vulnerabilities in order to ...