منابع مشابه
The Security-specific Eight Stage Risk Assessment Methodology
Existing security risk assessment methodologies have three major flaws: they rely on the assessor to formulate the chain of events that describe each of its threat scenarios, their models cause a combinatorial explosion of calculations due to analysis of the effectiveness of each countermeasure against each threat/vulnerability pair, and they do not spotlight the specific area of improvement ne...
متن کاملSecurity Risk Assessment of Software Architecture, Methodology and Validation
Security risk assessment is considered a significant and indispensable process in all phases of software development lifecycles, and most importantly at the early phases. Estimating the security risk should be integrated with the other product developments parts and this will help developers and engineers determine the risky elements in the software system, and reduce the failure consequences i...
متن کاملEffective Methodology for Security Risk Assessment of Computer Systems
Today, computer systems are more and more complex and support growing security risks. The security managers need to find effective security risk assessment methodologies that allow modeling well the increasing complexity of current computer systems but also maintaining low the complexity of the assessment procedure. This paper provides a brief analysis of common security risk assessment methodo...
متن کاملConsiderations on Visible Light Communication security by applying the Risk Matrix methodology for risk assessment
Visible Light Communications (VLC) is a cutting edge technology for data communication that is being considered to be implemented in a wide range of applications such as Inter-vehicle communication or Local Area Network (LAN) communication. As a novel technology, some aspects of the implementation of VLC have not been deeply considered or tested. Among these aspects, security and its implementa...
متن کاملSecurity Assessment Methodology for Critical Infrastructure Components
Protecting critical infrastructure assets such as telecommunications networks and energy generation and distribution facilities from cyber attacks is a major challenge. However, because security is a complex and multi-layered topic, a foundation for manufacturers to assess the security of products used in critical infrastructures is often missing. This paper describes a structured security asse...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Procedia Engineering
سال: 2012
ISSN: 1877-7058
DOI: 10.1016/j.proeng.2012.08.106