Risk assessment of voting systems for teaching the art of information security
Abstract
References
Index Terms
- Risk assessment of voting systems for teaching the art of information security
Recommendations
Assessing student performance outcomes in an information security risk assessment, service learning course
CITC5 '04: Proceedings of the 5th conference on Information technology educationThis focus of this paper is on the assessment of student performance in an information security risk assessment, service learning course. The paper provides a brief overview of the information security risk assessment course as background information ...
Taxonomy of information security risk assessment (ISRA)
Information is a perennially significant business asset in all organizations. Therefore, it must be protected as any other valuable asset. This is the objective of information security, and an information security program provides this kind of ...
Information Security Risk Assessment Using Markov Models
ISECS '10: Proceedings of the 2010 Third International Symposium on Electronic Commerce and SecurityRisk assessment is important in assessing the security states in information security. This paper proposed to use Markov models to assess the risk of information security. The simulation results were shown using different distributions.
Comments
Information & Contributors
Information
Published In
Sponsors
- KSU - CISE: KSU Center for InfoSec Education
- ISSA: The Metro Atlanta Information Systems Security Association
In-Cooperation
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Conference
- KSU - CISE
- ISSA
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 287Total Downloads
- Downloads (Last 12 months)11
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in