Comparative Study of Information Security Risk Assessment Frameworks
نویسندگان
چکیده
منابع مشابه
A Comparative Analysis on Risk Assessment Information Security Models
This study equates a choice of methods that allow an organization to weigh their information security risk. The initial models went through two selection iterations before we end up with the final three Risks assessment models. The main purpose of the study is to compare and clarify the different activities, inputs and outputs required by each information security risk assessment models and als...
متن کاملComparative Study of Information Security Risk Assessment Models for Cloud Computing systems
This paper reviews the state of the art in cyber security risk assessment of Cloud Computing systems. We select and examine in detail the quantitative security risk assessment models developed for or applied especially in the context of a Cloud Computing system. We review and then analyze existing models in terms of aim; the stages of risk management addressed; key risk management concepts cove...
متن کاملA Comparative Study on Information Security Risk Analysis Methods
Background – Risk Analysis is an integral part of management practice and an essential element of good corporate governance. There are many risk analysis methods available today, and it is a tedious task for an organization (particularly small and mid-scale company) to choose the proper method. Problem – Although many methods and tools are available in this domain, very few inventories do exist...
متن کاملTaxonomy of information security risk assessment (ISRA)
Information is a perennially significant business asset in all organizations. Therefore, it must be protected as any other valuable asset. This is the objective of information security, and an information security program provides this kind of protection for a company’s information assets and for the company as a whole. One of the best ways to address information security problems in the corpor...
متن کاملInformation Security Risk Assessment, Aggregation, and Mitigation
As part of their compliance process with the Basel 2 operational risk management requirements, banks must define how they deal with information security risk management. In this paper we describe work in progress on a new quantitative model to assess and aggregate information security risks that is currently under development for deployment. We show how to find a risk mitigation strategy that i...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: INTERNATIONAL JOURNAL OF COMPUTER APPLICATION
سال: 2018
ISSN: 2250-1797
DOI: 10.26808/rs.ca.i8v2.08