[HTML][HTML] Prioritization of information security controls through fuzzy AHP for cloud computing networks and wireless sensor networks

MI Tariq, S Ahmed, NA Memon, S Tayyaba, MW Ashraf… - Sensors, 2020 - mdpi.com
With the advent of cloud computing and wireless sensor networks, the number of
cyberattacks has rapidly increased. Therefore, the proportionate security of networks has …

Combination of AHP and TOPSIS methods for the ranking of information security controls to overcome its obstructions under fuzzy environment

MI Tariq, S Tayyaba, N Ali Mian… - Journal of Intelligent …, 2020 - content.iospress.com
The organizations utilizing the cloud computing services are required to select suitable
Information Security Controls (ISCs) to maintain data security and privacy. Many …

[HTML][HTML] MASISCo—Methodological Approach for the Selection of Information Security Controls

M Diéguez, C Cares, C Cachero, J Hochstetter - Applied Sciences, 2023 - mdpi.com
As cyber-attacks grow worldwide, companies have begun to realize the importance of being
protected against malicious actions that seek to violate their systems and access their …

Mapping the variations for implementing information security controls to their operational research solutions

M Diéguez, J Bustos, C Cares - Information Systems and e-Business …, 2020 - Springer
Abstract Information Security Management is currently guided by process-based standards.
Achieving one or some of these standards means deploying their corresponding set of …

A structured comparison of the corporate information security maturity level

M Schmid, S Pape - ICT Systems Security and Privacy Protection: 34th IFIP …, 2019 - Springer
Generally, measuring the information security maturity is the first step to build a knowledge
information security management system in an organization. Unfortunately, it is not possible …

[PDF][PDF] Comparación de dos enfoques cuantitativos para seleccionar controles de seguridad de la información

M Diéguez, C Cares - Revista Ibérica de Sistemas e Tecnologias de …, 2019 - academia.edu
Proporcionar procesos y herramientas sistemáticos para tomar una decisión sobre
inversiones en seguridad en un escenario con restricciones presupuestarias, es de suma …

MASISCo—Methodological Approach for the Selection of Information Security Controls

M Diéguez Rebolledo, C Cares Gallardo, C Cachero… - 2023 - rua.ua.es
As cyber-attacks grow worldwide, companies have begun to realize the importance of being
protected against malicious actions that seek to violate their systems and access their …

Vergleichbare Informationssicherheits-Kennzahlen innerhalb einer Branche: Äpfel oder Birnen, das ist hier die Frage

M Schmid - IT-Prüfung, Datenschutzaudit und Kennzahlen für die …, 2020 - Springer
Zusammenfassung „Ich frage nach Äpfeln, und du antwortest mir von Birnen “so lauten
vereinzelt Aussagen des Managements an den Informationssicherheitsverantwortlichen …