No abstract available.
Cited By
- Le A, Chen Y, Chai K, Vasenev A and Montoya L (2019). Incorporating FAIR into Bayesian Network for Numerical Assessment of Loss Event Frequencies of Smart Grid Cyber Threats, Mobile Networks and Applications, 24:5, (1713-1721), Online publication date: 1-Oct-2019.
- Arogundade O, Adeniran O, Jin Z and Xiaoguang Y (2016). Towards Ontological Approach to Security Risk Analysis of Information System, International Journal of Secure Software Engineering, 7:3, (1-25), Online publication date: 1-Jul-2016.
- Huang X, Craig P, Lin H and Yan Z (2016). SecIoT, Security and Communication Networks, 9:16, (3083-3094), Online publication date: 10-Nov-2016.
- Bandopadhyay S, Sengupta A and Mazumdar C A quantitative methodology for information security control gap analysis Proceedings of the 2011 International Conference on Communication, Computing & Security, (537-540)
- Bartsch S A calculus for the qualitative risk assessment of policy override authorization Proceedings of the 3rd international conference on Security of information and networks, (62-70)
- Islam S and Dong W Human factors in software security risk management Proceedings of the first international workshop on Leadership and management in software architecture, (13-16)
- Futcher L and von Solms R Guidelines for secure software development Proceedings of the 2008 annual research conference of the South African Institute of Computer Scientists and Information Technologists on IT research in developing countries: riding the wave of technology, (56-65)
- Papadaki K and Polemi N Towards a knowledge-sharing approach for Information Security Risk Management Proceedings of the 2008 conference on Knowledge-Based Software Engineering: Proceedings of the Eighth Joint Conference on Knowledge-Based Software Engineering, (453-461)
- Bai Y, Summers W and Bosworth E Teaching network risk assessment to online graduate students Proceedings of the 4th annual conference on Information security curriculum development, (1-6)
- Stakhanova N, Basu S and Wong J (2007). A taxonomy of intrusion response systems, International Journal of Information and Computer Security, 1:1/2, (169-184), Online publication date: 1-Jan-2007.
- Beachboard J, Cole A, Mellor M, Hernandez S, Aytes K and Massad N A tentative proposal Proceedings of the 3rd annual conference on Information security curriculum development, (194-196)
- Mader A and Srinivasan S Curriculum development related to information security policies and procedures Proceedings of the 2nd annual conference on Information security curriculum development, (49-53)
Index Terms
- Information Security Risk Analysis
Recommendations
Taxonomy of information security risk assessment (ISRA)
Information is a perennially significant business asset in all organizations. Therefore, it must be protected as any other valuable asset. This is the objective of information security, and an information security program provides this kind of ...
Information Lifecycle Security Risk Assessment: A tool for closing security gaps
News media continue to report stories of critical information loss through physical means. Most information security programs include physical protection for information system infrastructure, but not for the physical (non-electronic) forms of the ...
Information Systems Security Risk Assessment: Harmonization with International Accounting Standards
CIMCA '08: Proceedings of the 2008 International Conference on Computational Intelligence for Modelling Control & AutomationThis paper emerges from research by [1],[11], [22] and [21], and it draws on real-world examples so as to underline some limits of quantitative risk assessment. The paper is a case study and emphasis that theoretical formulas used in information ...