Research Output
Cyber security in practice: identifying areas of vulnerability.
  Areas covered include: - Using penetration testing to highlight areas of weakness - Practical steps for improving the security of your organisation.

  • Type:

    Conference Paper (unpublished)

  • Date:

    05 February 2015

  • Publication Status:

    Unpublished

  • Library of Congress:

    QA76 Computer software

  • Dewey Decimal Classification:

    005.8 Data security

Citation

Buchanan, W. J., & Smales, A. (2015, February). Cyber security in practice: identifying areas of vulnerability. Paper presented at Scot-Secure 2015, Holyrood, Edinburgh

Authors

Keywords

Cybersecurity; risk assessment; risk management; organisational management;

Monthly Views:

Available Documents