The Management of Security

  • John M. D. Hunter
Part of the Computer Communications and Networks book series (CCN)


So far the discussion has been centred mainly on the various techniques one can employ to counter various security threats. Good security consists of rather more than the mere application of countermeasures. It is thought by many people that the answer to any security problem is to apply every available countermeasure. The supposed advantage of this approach is that it covers every eventuality.


Security Policy Security Requirement Vulnerability Index Security Threat Security Problem 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag London 2001

Authors and Affiliations

  • John M. D. Hunter
    • 1
  1. 1.CISM GroupCranfield University, RMCSShrivenham, SwindonUK

Personalised recommendations