Minimizing incident response time in real-world scenarios using quantum computing

MA Serrano, LE Sánchez, A Santos-Olmo… - Software Quality …, 2024 - Springer
Abstract The Information Security Management Systems (ISMS) are global and risk-driven
processes that allow companies to develop their cybersecurity strategy by defining security …

Security risk analysis in IoT systems through factor identification over IoT devices

RO Andrade, SG Yoo, I Ortiz-Garces, J Barriga - Applied Sciences, 2022 - mdpi.com
IoT systems contribute to digital transformation through the development of smart concepts.
However, the IoT has also generated new security challenges that require security tools to …

Risk assessment in fleet management system using OCTAVE allegro

S Alfarisi, N Surantha - Bulletin of Electrical Engineering and Informatics, 2022 - beei.org
The purpose of this study is to use the OCTAVE allegro methodology to identify risks in fleet
management system (FMS), determine prioritized risks to be mitigated, provide mitigation …

A proposed framework for ranking critical information assets in information security risk assessment using the octave allegro method with decision support system …

AD Prajanti, K Ramli - 2019 34th International Technical …, 2019 - ieeexplore.ieee.org
The security of an organization lies not only in physical buildings, but also in its information
assets. Safeguarding information assets requires further study to establish optimal security …

[PDF][PDF] Penilaian Risiko Aset Informasi dengan Metode OCTAVE Allegro: Studi Kasus ICT Fakultas Ilmu Komputer Universitas Sriwijaya

A Zulfia, EL Ruskan, P Putra - JOINS (Journal of Information System), 2021 - academia.edu
Informasi yang merupakan aset berharga bagi organisasi sangat penting dikelola risikonya
agar dapat mempertahankan kelangsungan bisnis. ICT Fakultas Ilmu Komputer Universitas …

Public-key reinforced blockchain platform for fog-IoT network system administration

MJ Baucas, P Spachos… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
The number of embedded devices that connect to a wireless network has been growing for
the past decade. This interaction creates a network of Internet-of-Things (IoT) devices where …

Analisis Risiko Keamanan Informasi Menggunakan Metode Octave Allegro Dan Analytical Hirarchy Process Pada Data Center Pemerintah Kabupaten Buleleng

N Budarsa - 2022 - repo.undiksha.ac.id
Penggunaan teknologi informasi dan komunikasi dalam bidang pemerintahan merupakan
suatu hal yang penting untuk mendukung sistem pemerintahan berbasis elektronik. Data …

Model for Technology Risk Assessment in Commercial Banks

W Kang, CF Cheung - Risks, 2024 - mdpi.com
As the complexity of banking technology systems increases, the prevention of technological
risk becomes an endless battle. Currently, most banks rely on the experience and subjective …

Commercial Bank IT Risk Evaluation Model Based on GA-BP Neural Network

W Kang, CF Cheung - 2023 IEEE 5th Eurasia Conference on …, 2023 - ieeexplore.ieee.org
To assess IT risk in commercial banks and reduce the probability of incidents, we
constructed a set of IT risk evaluation indices based on determining the set of IT risk factors …