Utilize este identificador para referenciar este registo:
https://hdl.handle.net/1822/39194
Registo completo
Campo DC | Valor | Idioma |
---|---|---|
dc.contributor.author | Borges, José | por |
dc.contributor.author | Martins, José | por |
dc.contributor.author | Andrade, Jorge | por |
dc.contributor.author | Santos, Henrique | por |
dc.date.accessioned | 2016-01-04T17:55:39Z | - |
dc.date.available | 2016-01-04T17:55:39Z | - |
dc.date.issued | 2015 | - |
dc.identifier.isbn | 978-1-910810-28-6 | - |
dc.identifier.uri | https://hdl.handle.net/1822/39194 | - |
dc.description.abstract | Information security is concerned with the protection of information, which can be stored, processed or transmitted within critical information systems of the organizations, against loss of confidentiality, integrity or availability. Protection measures to prevent these problems result through the implementation of controls at several dimensions: technical, administrative or physical. A vital objective for military organizations is to ensure superiority in contexts of information warfare and competitive intelligence. Therefore, the problem of information security in military organizations has been a topic of intensive work at both national and transnational levels, and extensive conceptual and standardization work is being produced. A current effort is therefore to develop automated decision support systems to assist military decision makers, at different levels in the command chain, to provide suitable control measures that can effectively deal with potential attacks and, at the same time, prevent, detect and contain vulnerabilities targeted at their information systems. The concept and processes of the Case-Based Reasoning (CBR) methodology outstandingly resembles classical military processes and doctrine, in particular the analysis of “lessons learned” and definition of “modes of action”. Therefore, the present paper addresses the modeling and design of a CBR system with two key objectives: to support an effective response in context of information security for military organizations; to allow for scenario planning and analysis for training and auditing processes. | por |
dc.language.iso | eng | por |
dc.publisher | Academic Conferences and Publishing International | por |
dc.rights | openAccess | por |
dc.subject | Conceptual model for information security | por |
dc.subject | Case-based reasoning | por |
dc.subject | Decision support system | por |
dc.subject | Method of attack | por |
dc.subject | Information security controls | por |
dc.title | Design of a case-based reasoner for information security in military organizations | por |
dc.type | conferencePaper | por |
dc.peerreviewed | yes | por |
sdum.publicationstatus | published | por |
oaire.citationStartPage | 26 | por |
oaire.citationEndPage | 34 | por |
oaire.citationConferencePlace | Hatfield, UK | por |
oaire.citationTitle | Proceedings of the 14th European Conference on Cyber Warfare and Security 2015: ECCWS 2015 | por |
dc.subject.fos | Ciências Naturais::Ciências da Computação e da Informação | por |
dc.subject.wos | Science & Technology | por |
sdum.journal | European Conference on Information Warfare and Security, Eccws | por |
sdum.conferencePublication | Proceedings of the 14th European Conference on Cyber Warfare and Security 2015: ECCWS 2015 | por |
sdum.bookTitle | PROCEEDINGS OF THE 14TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS-2015) | por |
Aparece nas coleções: |
Ficheiros deste registo:
Ficheiro | Descrição | Tamanho | Formato | |
---|---|---|---|---|
CaseBasedReasoningForInformationSecurity (2Mar15).pdf | 513,09 kB | Adobe PDF | Ver/Abrir |