Fast Abstract: Software Selection Based on Quantitative Security Risk Assessment

R Das, S Sarkani, TA Mazzuchi - 2012 IEEE 14th International …, 2012 - ieeexplore.ieee.org
Multiple software products often exist on the same server and, thus, vulnerability in one
product might compromise the entire environment. Therefore security risk assessments of …

Avt vector: A quantitative security requirements evaluation approach based on assets, vulnerabilities and trustworthiness of environment

T Long, L Liu, Y Yu, Z Jin - 2009 17th IEEE International …, 2009 - ieeexplore.ieee.org
Security requirements analysis is gaining growing attention as new vulnerabilities and
threats are emerging on daily basis, the systematic evaluation of security requirements is of …

[图书][B] Vulnerability identification errors in security risk assessments

S Taubenberger - 2014 - search.proquest.com
At present, companies rely on information technology systems to achieve their business
objectives, making them vulnerable to cybersecurity threats. Information security risk …

[PDF][PDF] Estimating security risk for web applications using security vectors

H Guan, WR Chen, L Liu, HJ Yang - Journal of Computers, 2012 - csroc.org.tw
Risk assessment has been getting increased attention as the new vulnerabilities and threats
are emerging on daily basis. The popularity and complexity of web application present …

Design of an on-line intrusion forecast system with a weather forecasting model

YJ Chung, IJ Kim, C Lee, EG Im, D Won - … , Glasgow, UK, May 8-11, 2006 …, 2006 - Springer
Abstract Information protection for information systems is the major concern for most of the
institutes, but there are a limited number of activities for the prevention of intrusion. Though …

A Study on Risk Assessment in Information Security

T Mandal, B Jana, S Mitra, J Poray - Available at SSRN 3261593, 2018 - papers.ssrn.com
Security measures cannot be assured 100% protection against all threats. Again information
is a perennially significant business asset in all organizations. That is why it must be …

[图书][B] Software System Selection based on First-Order Security Risk Assessment

R Das - 2013 - search.proquest.com
Often, multiple software products exist on the same server and vulnerability in one product
compromises the entire system. It is imperative then, to perform a security risk assessment …

Information asset modelling for risk analysis

YG Sung, P Kang, WT Sim - WIT Transactions on The Built …, 2007 - witpress.com
An information technology-driven organization, in which most business is carried out and its
revenue is presented through information technology, increasingly provides their key …

3 차원벡터시각화를활용한효과적인위험수준평가

이주영, 조인현, 이재희, 이경호 - 정보보호학회논문지, 2015 - dbpia.co.kr
위험분석은 위험을 허용 가능한 수준으로 관리하기 위한 방안을 수립하는 데 활용된다. 이러한
위험관리 의사결정에 있어서 위험의 시각화는 중요하다. 그러나 기존의 위험 시각화 방식은 …

A Study on the Modeling Mechanism for Security Risk Analysis in Information Systems

C Yoonjung, W Dongho - The KIPS Transactions: PartC, 2005 - koreascience.kr
Abstract Information systems are today becoming larger and mostly broadband-networked.
This exposes them at a higher risk of intrusions and hacking than ever before. Of the …