Applying common inventory using ISO controls to control ransomware. For brevity, we use the ‘ISO number’ notation to depict ISO/IEC 27002 clauses. Adapted from: Ho et al. [16].
Sign In or Create an Account
This PDF is available to Subscribers Only
For full access to this pdf, sign in to an existing account, or purchase an annual subscription.