alexa Software Security Latest Research| OMICS International | Journal Of Information Technology And Software Engineering

Our Group organises 3000+ Global Conferenceseries Events every year across USA, Europe & Asia with support from 1000 more scientific societies and Publishes 700+ Open Access Journals which contains over 50000 eminent personalities, reputed scientists as editorial board members.


Bhaskar and Ahson state that security controls are selected and applied based on a risk assessment of the information system. The risk assessment process identifies system threats and vulnerabilities, and controls are for mitigating risk and to reduce probability of loss. When management chooses to mitigate a risk, they will do so by implementing one or more of three different types of controls. Purcell states that security controls are measures taken to safeguard an information system from the attacks against the confidentiality, integrity, and availability of the information system. There are two ways to categorize security controls. The first way is to put the security control into administrative, technical (also called logical), or physical control categories. In this taxonomy, the control category is based on their nature. The second way to categorize security controls is taxonomy according to the time that they act, relative to a security incident, they are directing, preventing and correcting. (Information Security Controls, YAU Hon Keung)
  • Share this page
  • Facebook
  • Twitter
  • LinkedIn
  • Google+
  • Pinterest
  • Blogger

Last date updated on November, 2020