Alignment of Misuse Cases to ISSRM
نویسندگان
چکیده
..........................................................................................................2 Acknowledgement ............................................................................................................................... 3 List of Figures ..................................................................................................................................... 7 List of Tables ....................................................................................................................................... 8 Abbreviation and Acronyms ............................................................................................................... 9
منابع مشابه
An Integrated Conceptual Model for Information System Security Risk Management and Enterprise Architecture Management Based on TOGAF
Technology Organisation (RTO) that develops advanced technologies and delivers innovative products and services to industry and society. As a major engine of the diversification and growth of Luxembourg's economy through innovation, LIST supports the deployment of a number of solutions to a wide range of sectors, including energy, IT, telecommunications, environment, agriculture, and advanced m...
متن کاملA Model Transformation from Misuse Cases to Secure Tropos
In current practices security concerns are typically addressed at the design or implementation stages, leaving aside the rationale for security analysis. The reason is that a systematic approach to address security from late development stages to early analysis stages does not exist. This paper presents transformation rules to perform model translation from misuse case diagram to Secure Tropos ...
متن کاملAn Extension of Business Process Model and Notation for Security Risk Management
Business process modelling is one of the major aspects in the modern information system development. Recently business process model and notation (BPMN) has become a standard technique to support this activity. Typically the BPMN notations are used to understand enterprise’s business processes. However, limited work exists regarding how security concerns are addressed during the management of t...
متن کاملA Comparison of Security Modelling Languages used for Security Risk Management
Nowadays, every company that has valuable assets has an urge to protect them. Unfortunately, it is impossible to act on every single security threat. To mitigate these threats Security Modelling Languages were extended to use for Security Risk Management. However, choosing suitable language can be a difficult decision, because it can be a problem to compare those languages and decide which one ...
متن کاملDeveloping a Model for theAlignment of Strategies of HRM with Macro-level Strageies in National Iranian Oil Company
The purpose of this study was to develop a model of alignment of HR strategies with macro-level strategies. The population of the research were directors and human resources experts of the National Iranian Oil Company and its subsidiaries. The sample needed for qualitative interviews to the extent of theoretical saturation and collected through a targeted judgment sampling of 14 people. Data an...
متن کامل