Please use this identifier to cite or link to this item: https://hdl.handle.net/2440/72837
Citations
Scopus Web of ScienceĀ® Altmetric
?
?
Full metadata record
DC FieldValueLanguage
dc.contributor.authorNunes-Vaz, R.-
dc.contributor.authorLord, S.-
dc.contributor.authorCiuk, J.-
dc.date.issued2011-
dc.identifier.citationJournal of Security Education, 2011; 6(3):372-393-
dc.identifier.issn1936-1610-
dc.identifier.issn1936-1629-
dc.identifier.urihttp://hdl.handle.net/2440/72837-
dc.description.abstractWhile the concept of security-in-depth or layered security has a long history, it still lacks clear definition, hampering attempts to identify the most effective target of security enhancement. A rigorous definition of security layer enables the development of useful principles to guide security investment. Risk minimization is best achieved by strengthening the layer that may already be the most effective, and by focusing on the weakest function within that layer. Moreover, security-in-depth relies not only on generating effective layers, but also on their coherent integration with maintenance, training, protocols and policies, all aligned with management structures and culture.-
dc.description.statementofresponsibilityRick Nunes-Vaz, Steven Lord & Jolanta Ciuk-
dc.language.isoen-
dc.publisherTaylor and Francis-
dc.rightsCopyright 2011 Crown Copyright-
dc.subjectSecurity-in-depth-
dc.subjectsecurity layers-
dc.subjectsecurity risk management-
dc.subjectterrorism risk-
dc.titleA more rigorous framework for security-in-depth-
dc.typeJournal article-
dc.identifier.doi10.1080/19361610.2011.580283-
pubs.publication-statusPublished-
dc.identifier.orcidLord, S. [0000-0002-6142-5358]-
Appears in Collections:Aurora harvest
Mathematical Sciences publications

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.