Sponsored by ComputerWeekly.com
This article in our Royal Holloway Information Security series assesses whether Resource Public Key Infrastructure can provide a framework for effective security. Access >>>
Table of contents
- The challenge of providing secure internet routing
- How does internet routing work?
- How can internet routing be secured?
Premium Content for Free.
More Premium Content Accessible For Free
Open Information Security Management Maturity Model (O-ISM3)
Organizations in different business sectors and countries have different business requirements and risk tolerances. The O-ISM3 framework helps ...
CW+ Open Group: The Open Group Architecture Framework (TOGAF™ 9) and the US DoD
This White Paper provides a comparative analysis of the two frameworks that describes where DoDAF products can be employed throughout the TOGAF ADM ...
Open Group: FAIR -ISO/IEC 27005 Cookbook
This document discusses the different purposes of the two standards, how to reconcile the two with regard to terminology and process, and combine the...