This paper discusses a methodology to apply 6-Sigma techniques as part of a security audit of a complete system for the purpose of threat assessment.
File Reference
6SIGMA
Publish Date
Resource Category
DigitalSubs
Resource File Link
/grid-solutions/sites/default/files/resources/products/applications/6-sigma_security.pdf
Resource Type
13
Resource Type Name
White Papers/Case Studies
Resource Passport Required
On
Resource Type