Please use this identifier to cite or link to this item:
http://hdl.handle.net/20.500.12253/537
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Sergio, Nunes | - |
dc.contributor.author | Miguel, Correia | - |
dc.date.accessioned | 2012-03-21T12:42:48Z | - |
dc.date.available | 2012-03-21T12:42:48Z | - |
dc.date.issued | 2012-03-21 | - |
dc.identifier.uri | http://hdl.handle.net/10884/537 | - |
dc.description.abstract | Many companies are deploying their business on the Internet using web applications while the question of what is the risk to business operations of cyber-attacks remains unanswered. Risk awareness allows to identify and act upon the security risk of these applications. This paper analyzes di erent security frameworks commonly used by companies in order to evaluate the bene ts of honeypots in responding to each framework's requirements and, consequently, mitigating the risk. | - |
dc.language.iso | eng | pt_PT |
dc.rights | openAccess | en |
dc.subject | Security | pt_PT |
dc.title | From Risk Awareness to Security Controls: Bene ts of Honeypots to Companies | pt_PT |
dc.type | article | pt_PT |
Appears in Collections: | A CTIC/GSC - Artigos |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
IBWAS2010.pdf | 223.8 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.