Comparative Analysis of Two Risk Assessment Methods in Information Systems

نویسندگان

  • Božo Nikolić
  • Ljiljana Ružić-Dimitrijević
چکیده

Risk management is the process that has to be applied to all areas of business. The paper sets out to discuss risk management primarily in the field of information systems. Numerous national and international standards have dealt with this field of work. American National Institute of Standards and Technology (NIST) has developed standards, instructions and guidelines for particular issues relating to risk management in information systems, which can be compared to the international ISO standards. Special Publications 800-30, 39, 37...examine the risk assessment method in information system (IS) which is in this paper analyzed in comparison with the method created by B. Nikolic, who has developed it in the field of Occupational Safety and Health (OSH), and which has been applied in the field of information technology (IT).

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Comparative performance assessment of flat plate and evacuated tube collectors for domestic water heating systems in Kerman, Iran

This study represents a year-round energy performance of two solar water heating (SWH) systems with a 4m2 flat plate collector (FPC) and an evacuated tube collector (ETC) operating under the same weather conditions. The energy performance of the two considered systems was compared on a monthly and yearly basis. The obtained results showed that for an annual total solar insolation of ...

متن کامل

A COMPARATIVE MODEL OF EVM AND PROJECT’S SCHEDULE RISK ANALYSIS USING MONTE CARLO SIMULATION

<span style="color: #000000; font-family: Tahoma, sans-serif; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: justify; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; display: inline !important; float: none; backgro...

متن کامل

A COMPARATIVE MODEL OF EVM AND PROJECT’S SCHEDULE RISK ANALYSIS USING MONTE CARLO SIMULATION

<span style="color: #000000; font-family: Tahoma, sans-serif; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: justify; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; display: inline !important; float: none; backgro...

متن کامل

Application of Fuzzy and FEMA Modified Methods in Risk Assessment of Man-Made Threats in Water Systems

Bacground and objective: Assessing the threats and vulnerabilities of infrastructure is one of the major concerns of security officials in a country, and water supply systems are one of the most important and sensitive infrastructures. Water supply systems are also among the basic infrastructures that are very important in assessing the threats in these systems and identifying its weaknesses. I...

متن کامل

A Comparative Study of Risk Assessment Methods, MEHARI & CRAMM with a New Formal Model of Risk Assessment (FoMRA) in Information Systems

In this article, we present a comparative study of a developed new formal mathematical model of risk assessment (FoMRA) with expert methods of risk assessment in the information systems (IS). Proposed analysis verified the correctness of theoretical assumptions of developed model. In the paper, the examples of computations illustrating the application of FoMRA and known and accepted throughout ...

متن کامل

بهبود رتبه بندی مخاطرات امنیت اطلاعات با استفاده از مدل های تصمیم گیری چند شاخصه

One of the most important capabilities of information security management systems, which must be implemented in all organizations according to their requirements, is information security risk management. The application of information security risk management is so important that it can be named as the heart of information security management systems. Information security risk rating is conside...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013