Comparative Analysis of Two Risk Assessment Methods in Information Systems
نویسندگان
چکیده
Risk management is the process that has to be applied to all areas of business. The paper sets out to discuss risk management primarily in the field of information systems. Numerous national and international standards have dealt with this field of work. American National Institute of Standards and Technology (NIST) has developed standards, instructions and guidelines for particular issues relating to risk management in information systems, which can be compared to the international ISO standards. Special Publications 800-30, 39, 37...examine the risk assessment method in information system (IS) which is in this paper analyzed in comparison with the method created by B. Nikolic, who has developed it in the field of Occupational Safety and Health (OSH), and which has been applied in the field of information technology (IT).
منابع مشابه
Comparative performance assessment of flat plate and evacuated tube collectors for domestic water heating systems in Kerman, Iran
This study represents a year-round energy performance of two solar water heating (SWH) systems with a 4m2 flat plate collector (FPC) and an evacuated tube collector (ETC) operating under the same weather conditions. The energy performance of the two considered systems was compared on a monthly and yearly basis. The obtained results showed that for an annual total solar insolation of ...
متن کاملA COMPARATIVE MODEL OF EVM AND PROJECT’S SCHEDULE RISK ANALYSIS USING MONTE CARLO SIMULATION
<span style="color: #000000; font-family: Tahoma, sans-serif; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: justify; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; display: inline !important; float: none; backgro...
متن کاملA COMPARATIVE MODEL OF EVM AND PROJECT’S SCHEDULE RISK ANALYSIS USING MONTE CARLO SIMULATION
<span style="color: #000000; font-family: Tahoma, sans-serif; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: justify; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; display: inline !important; float: none; backgro...
متن کاملApplication of Fuzzy and FEMA Modified Methods in Risk Assessment of Man-Made Threats in Water Systems
Bacground and objective: Assessing the threats and vulnerabilities of infrastructure is one of the major concerns of security officials in a country, and water supply systems are one of the most important and sensitive infrastructures. Water supply systems are also among the basic infrastructures that are very important in assessing the threats in these systems and identifying its weaknesses. I...
متن کاملA Comparative Study of Risk Assessment Methods, MEHARI & CRAMM with a New Formal Model of Risk Assessment (FoMRA) in Information Systems
In this article, we present a comparative study of a developed new formal mathematical model of risk assessment (FoMRA) with expert methods of risk assessment in the information systems (IS). Proposed analysis verified the correctness of theoretical assumptions of developed model. In the paper, the examples of computations illustrating the application of FoMRA and known and accepted throughout ...
متن کاملبهبود رتبه بندی مخاطرات امنیت اطلاعات با استفاده از مدل های تصمیم گیری چند شاخصه
One of the most important capabilities of information security management systems, which must be implemented in all organizations according to their requirements, is information security risk management. The application of information security risk management is so important that it can be named as the heart of information security management systems. Information security risk rating is conside...
متن کامل