Security Risk Assessment: Towards a Justification for the Security Risk Factor Table Model
نویسندگان
چکیده
One of the widely used methods to gauge risk is the Security Risk Factor Table (SRFT) model. While this model has been empirically successful, its use is limited by the fact that its formulas do not have a theoretical explanation – and thus, there is no guarantee that these formulas will work in other situations as well. In this paper, we provide a theoretical explanation for the SFRT formulas. 1 Formulation of the Problem Security Risk Factor Table (SRFT) model: a brief description. Many systems face security risks. To properly protect these systems, it is important to gauge relative security risk of different systems, so that more resources will be used to protect systems with higher risk. One of the widely used techniques for gauging risk is the Security Risk Factor Table (SRFT) model; see, e.g., [1, 2, 3, 4]. In this model, important factors affecting risk are listed, such as location, visibility, inventory, etc. For each factor, experts estimate the risk corresponding to this factor by selecting a number from 0 to 5, 0 meaning lowest risk and 5 meaning highest risk. Numbers corresponding to different factors are then added into a single risk score. Based on the value of the risk score, the system’s risk is then classified into low, moderate, high, and extreme. For example, for 15 factors: • scores below 15 indicate low risk; • scores from 16 to 30 indicate moderate risk; • scores from 31 to 45 indicate high risk, and
منابع مشابه
ارائه الگویی برای ارزیابی ریسک آتشسوزیهای عمدی
Background & Objectives : It is not possible to live without using fire. However, fire could destruct human properties in a short time. One of the most important types of fire is intentional fire. This type of fire has become a great problem for insurance companies, fire departments, industries, government and business in the recent years. This study aimed to provide a framework for risk assess...
متن کاملMapping of McGraw Cycle to RUP Methodology for Secure Software Developing
Designing a secure software is one of the major phases in developing a robust software. The McGraw life cycle, as one of the well-known software security development approaches, implements different touch points as a collection of software security practices. Each touch point includes explicit instructions for applying security in terms of design, coding, measurement, and maintenance of softwar...
متن کاملA risk model for cloud processes
Traditionally, risk assessment consists of evaluating the probability of "feared events", corresponding to known threats and attacks, as well as these events' severity, corresponding to their impact on one or more stakeholders. Assessing risks of cloud-based processes is particularly difficult due to lack of historical data on attacks, which has prevented frequency-based identification...
متن کاملبهبود رتبه بندی مخاطرات امنیت اطلاعات با استفاده از مدل های تصمیم گیری چند شاخصه
One of the most important capabilities of information security management systems, which must be implemented in all organizations according to their requirements, is information security risk management. The application of information security risk management is so important that it can be named as the heart of information security management systems. Information security risk rating is conside...
متن کاملContamination and Risk Assessment of Total Aflatoxin in Iranian Rice in Various Food Security Regions
Background and Objectives: Aflatoxin is one of the most important and common toxins in high consumption foods such as rice, which can threaten health of the consumers. In this study, risk of total aflatoxin based on its exposure levels and adverse effects was assessed in Iranian rice. Materials & Methods: This study was carried out on total aflatoxin in 60 national rice samples collected base...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- JACIII
دوره 19 شماره
صفحات -
تاریخ انتشار 2015