posted on 2003-01-01, 00:00authored byT Busuttil, Matthew Warren
Wilh the protection of critical information infrastructure becoming a priority for all levels of management. there is a need for a new security methodology to deal with the new and unique attack threats and vulnerabilities associated with the new information technology security paradigm. The fourth generation security risk analysis melhod which copes wilh the shift from computer/information security to critical information iinfrastructure protectionl is lhe next step toward handling security risk at all levels. The paper will present the methodology of<br>fourth generation models and their application to critical information infrastructure protection and the associated advantagess of this methodology.<br>
History
Location
Adelaide, Australia
Language
eng
Notes
Invalid ISBN provided : 086803995
Publication classification
E1 Full written paper - refereed
Copyright notice
2003, The authors
Editor/Contributor(s)
J Slay
Pagination
91 - 103
Start date
2003-11-20
End date
2003-11-21
Title of proceedings
Proceedings 4th Australian Information Warfare and IT Security Conference - Enhancing Trust
Event
Australian Information Warfare and IT Security Conference (4th : 2003 : Adelaide, Australia)