[1]
|
Fink, D. (1994) A Security Framework for Information Systems Outsourcing. Information Management & Computer Security, 2, 3-8. http://dx.doi.org/10.1108/09685229410068235
|
[2]
|
Symons, C. (2005) It Governance Framework. Forrester Best Practices, 29, 2005.
|
[3]
|
Oreku, G.S. and Li, J. (2005) Rethinking e-Commerce Security. International Conference on Computational Intelligence for Modelling, Control and Automation and International Conference on Intelligent Agents, Web Technologies and Internet Commerce, Vol. 1, 223-228.
|
[4]
|
Oreku, G.S. and Mbowe, J.E. (2014) Critical Infrastructure Protection. The International Conference on Digital Security and Forensics (DigitalSec2014), The Society of Digital Information and Wireless Communication.
|
[5]
|
Yeboah, T. (2013) A Proposed Information Technology Audit Framework for Microfinance Kumasi. Journal of Engineering Computers & Applied Sciences, 2, 1-7.
|
[6]
|
DBIR (2014) 2014 Data Breach Investigation Report. Verizon Document, Tech. Rep.
|
[7]
|
Beckers, K., Faβbender, S., Hatebur, D., Heisel, M. and Coté, I. (2013) Common Criteria Compliant Software Development (cc-casd). Proceedings of the 28th Annual ACM Symposium on Applied Computing, 1298-1304.
|
[8]
|
Alberts, C., Dorofee, A., Stevens, J. and Woody, C. (2003) Introduction to the Octave Approach. Carnegie Mellon University, Pittsburgh.
|
[9]
|
den Braber, F., Hogganvik, I., Lund, M., Stolen, K. and Vraalsen, F. (2007) Model-Based Security Analysis in Seven Stepsa Guided Tour to the CORAS Method. BT Technology Journal, 25, 101-117.
http://dx.doi.org/10.1007/s10550-007-0013-9
|
[10]
|
Scandariato, R., Wuyts, K. and Joosen, W. (2014) A Descriptive Study of Microsoft Threat Modeling Technique. Requirements Engineering, 1-18.
|
[11]
|
Sommestad, T., Ekstedt, M. and Holm, H. (2013) The Cyber Security Modeling Language: A Tool for Assessing the Vulnerability of Enterprise System Architectures. Systems Journal, 7, 363-373.
http://dx.doi.org/10.1109/JSYST.2012.2221853
|
[12]
|
Keating, C.G. (2014) Validating the Octave Allegro Information Systems Risk Assessment Methodology: A Case Study. Ph.D. Dissertation, Nova Southeastern University.
|
[13]
|
Abdullah, H. Ooda-Octave, a Novel Approach to Information Security Risk Analysis.
http://osprey.unisa.ac.za/TechnicalReports/h5.pdf
|
[14]
|
Lund, M.S., Solhaug, B. and Stolen, K. (2011) A Guided Tour of the Coras Method. Model-Driven Risk Analysis, Springer, 23-43. http://dx.doi.org/10.1007/978-3-642-12323-8_3
|
[15]
|
ISO 21827 Information Technology Security Techniques. Code of Practice for Information Security Management.
http://www.sabs.co.za/content/uploads/files/SANS21827%28colour%29.pdf
|
[16]
|
De Bruin, T., Freeze, R., Kaulkarni, U. and Rosemann, M. (2005) Understanding the Main Phases of Developing a Maturity Assessment Model.
|