The Security Risk Assessment Methodology

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Security-specific Eight Stage Risk Assessment Methodology

Existing security risk assessment methodologies have three major flaws: they rely on the assessor to formulate the chain of events that describe each of its threat scenarios, their models cause a combinatorial explosion of calculations due to analysis of the effectiveness of each countermeasure against each threat/vulnerability pair, and they do not spotlight the specific area of improvement ne...

متن کامل

Security Risk Assessment of Software Architecture, Methodology and Validation

Security risk assessment is considered a significant and indispensable process in all phases of software development lifecycles, and most importantly at the early phases. Estimating the security risk should be integrated with the other product developments parts and this will help developers and engineers determine the risky elements in the software system, and reduce the failure consequences i...

متن کامل

Effective Methodology for Security Risk Assessment of Computer Systems

Today, computer systems are more and more complex and support growing security risks. The security managers need to find effective security risk assessment methodologies that allow modeling well the increasing complexity of current computer systems but also maintaining low the complexity of the assessment procedure. This paper provides a brief analysis of common security risk assessment methodo...

متن کامل

Considerations on Visible Light Communication security by applying the Risk Matrix methodology for risk assessment

Visible Light Communications (VLC) is a cutting edge technology for data communication that is being considered to be implemented in a wide range of applications such as Inter-vehicle communication or Local Area Network (LAN) communication. As a novel technology, some aspects of the implementation of VLC have not been deeply considered or tested. Among these aspects, security and its implementa...

متن کامل

Security Assessment Methodology for Critical Infrastructure Components

Protecting critical infrastructure assets such as telecommunications networks and energy generation and distribution facilities from cyber attacks is a major challenge. However, because security is a complex and multi-layered topic, a foundation for manufacturers to assess the security of products used in critical infrastructures is often missing. This paper describes a structured security asse...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Procedia Engineering

سال: 2012

ISSN: 1877-7058

DOI: 10.1016/j.proeng.2012.08.106