Security controls

Known as: Control, IA controls, Information security controls 
Security controls are safeguards or countermeasures to avoid, detect, counteract, or minimize security risks to physical property, information… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1969-2018
05019692018

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
Selection of proper security controls is an important part of building a secure information infrastructure in an organization… (More)
  • figure 1
  • table I
  • table III
  • table IV
  • table II
Is this relevant?
2012
2012
The use of Smartphones in business has grown in the recent years bringing new ways to create and share information. Among the… (More)
  • figure 1
Is this relevant?
2010
2010
For organizations, the protection of information is of utmost importance. Throughout the years, organizations have experienced… (More)
  • table 1
  • table 2
  • table 3
Is this relevant?
2010
2010
Security certification assesses the security posture of a software system to verify its compliance with diverse, pre-specified… (More)
  • table 1
  • figure 1
  • table 2
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2009
Highly Cited
2009
This paper examines some of the key issues relating to insider threats to information security and the nature of loyalty and… (More)
Is this relevant?
2007
2007
We present an innovative way to assess the effectiveness of security controls where measurable aspects of controls are first… (More)
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Web-based applications greatly increase information availability and ease of access, which is optimal for public information. The… (More)
  • figure 1
  • figure 2
  • figure 3
  • table I
  • figure 4
Is this relevant?
Highly Cited
2002
Highly Cited
2002
One of the most information security controls is the information security policy. This vital direction-giving document is… (More)
  • table 1
  • table 2
Is this relevant?
1996
1996
We propose a security paradigm in which software security controls are implemented as ubiquitous, communicating, dynamically… (More)
  • figure I
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
1969
Highly Cited
1969
At present, the system described in this paper has not been approved by the Department of Defense for processing classified… (More)
  • figure 1
  • table IV
Is this relevant?