Comparative Study of Information Security Risk Assessment Frameworks

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Comparative Analysis on Risk Assessment Information Security Models

This study equates a choice of methods that allow an organization to weigh their information security risk. The initial models went through two selection iterations before we end up with the final three Risks assessment models. The main purpose of the study is to compare and clarify the different activities, inputs and outputs required by each information security risk assessment models and als...

متن کامل

Comparative Study of Information Security Risk Assessment Models for Cloud Computing systems

This paper reviews the state of the art in cyber security risk assessment of Cloud Computing systems. We select and examine in detail the quantitative security risk assessment models developed for or applied especially in the context of a Cloud Computing system. We review and then analyze existing models in terms of aim; the stages of risk management addressed; key risk management concepts cove...

متن کامل

A Comparative Study on Information Security Risk Analysis Methods

Background – Risk Analysis is an integral part of management practice and an essential element of good corporate governance. There are many risk analysis methods available today, and it is a tedious task for an organization (particularly small and mid-scale company) to choose the proper method. Problem – Although many methods and tools are available in this domain, very few inventories do exist...

متن کامل

Taxonomy of information security risk assessment (ISRA)

Information is a perennially significant business asset in all organizations. Therefore, it must be protected as any other valuable asset. This is the objective of information security, and an information security program provides this kind of protection for a company’s information assets and for the company as a whole. One of the best ways to address information security problems in the corpor...

متن کامل

Information Security Risk Assessment, Aggregation, and Mitigation

As part of their compliance process with the Basel 2 operational risk management requirements, banks must define how they deal with information security risk management. In this paper we describe work in progress on a new quantitative model to assess and aggregate information security risks that is currently under development for deployment. We show how to find a risk mitigation strategy that i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: INTERNATIONAL JOURNAL OF COMPUTER APPLICATION

سال: 2018

ISSN: 2250-1797

DOI: 10.26808/rs.ca.i8v2.08