Organizational computing devices are increasingly becoming targets of cyber-attacks, and organizations have become dependent on the safety and security of their computer networks and their organizational computing devices. Business and government often use defense in-depth information assurance measures such as firewalls, intrusion detection systems, and password procedures across their enterprises to plan strategically and manage IT security risks. This quantitative study explores whether the analytical hierarchy process (AHP) model can be effectively applied to the prioritization of information assurance defense in-depth measures.
Author: Rodney Alexander
Do you want ot get/download the Solving Information Assurance Issues using Defense in Depth Measures and The Analytical Hiearchy Process as Paperback or Kindle/pdf eBook?