메뉴 건너뛰기




Volumn 10, Issue 2, 2005, Pages 19-38

Mission Oriented risk and Design Analysis of critical information systems

Author keywords

[No Author keywords available]

Indexed keywords


EID: 33144462443     PISSN: 02755823     EISSN: None     Source Type: Journal    
DOI: 10.5711/morj.10.2.19     Document Type: Review
Times cited : (59)

References (32)
  • 4
    • 33144477369 scopus 로고    scopus 로고
    • Comparison of aggregation techniques for Mission Oriented Risk and Design Analysis (MORDA) attack values
    • Innovative Decisions, Inc, September
    • Buckshaw, D., Parnell, G., Smith, G., Unkenholz, W. L., and Parks, D. L., "Comparison of Aggregation Techniques for Mission Oriented Risk and Design Analysis (MORDA) Attack Values," Innovative Decisions, Inc, Technical Report 2004-04, September, 2004.
    • (2004) Technical Report , vol.2004 , Issue.4
    • Buckshaw, D.1    Parnell, G.2    Smith, G.3    Unkenholz, W.L.4    Parks, D.L.5
  • 7
    • 0030701247 scopus 로고    scopus 로고
    • Information system attacks: A preliminary classification scheme
    • 1997
    • Cohen, F., 1997, "Information System Attacks: A Preliminary Classification Scheme," Computer & Security, Vol. 16, No. 1, 1997, pp. 29-46.
    • (1997) Computer & Security , vol.16 , Issue.1 , pp. 29-46
    • Cohen, F.1
  • 8
    • 33144471297 scopus 로고    scopus 로고
    • unpublished white paper
    • Design Analysis Working Group (DAWG), National Security Agency, 2004, "A Comparison of Risk Assessment Methodologies," unpublished white paper.
    • (2004) A Comparison of Risk Assessment Methodologies
  • 10
    • 0003931072 scopus 로고    scopus 로고
    • Joint Chiefs of Staff, Joint Publication 3-13, Washington: Pentagon
    • Department of Defense, 1998, Joint Chiefs of Staff, Joint Publication 3-13, Joint doctrine for Information Operations, Washington: Pentagon.
    • (1998) Joint Doctrine for Information Operations
  • 12
    • 33144464064 scopus 로고    scopus 로고
    • Risk management and the value of information in a defense computer system
    • Hamill, T. J., Deckro, R. F., Kloeber, J. M., Kelso, T. S., 2002, "Risk Management and the Value of Information in A Defense Computer System," Military Operations Research, 7 (2) 61-82.
    • (2002) Military Operations Research , vol.7 , Issue.2 , pp. 61-82
    • Hamill, T.J.1    Deckro, R.F.2    Kloeber, J.M.3    Kelso, T.S.4
  • 21
    • 4644317619 scopus 로고
    • Information systems security: A comprehensive model
    • October. National Institute of Standards and Technology, Baltimore, MD
    • th National Computer Security Conference. National Institute of Standards and Technology, Baltimore, MD.
    • (1991) th National Computer Security Conference
    • McCumber, J.1
  • 25
    • 85020200328 scopus 로고    scopus 로고
    • Toward a secure system engineering methodology
    • September New Security Paradigms Workshop, Counterpane Systems, 101 East Minnehaha Parkway, Minneapolis, MN 55419
    • Salter, C., Saydjari, O., Schneier, B., and Wallner, J., September 1998, "Toward a Secure System Engineering Methodology," New Security Paradigms Workshop. Technical Report, Counterpane Systems, 101 East Minnehaha Parkway, Minneapolis, MN 55419.
    • (1998) Technical Report
    • Salter, C.1    Saydjari, O.2    Schneier, B.3    Wallner, J.4
  • 26
    • 0002670359 scopus 로고    scopus 로고
    • Attack trees: Modeling security threats
    • December
    • Schneier, B., December 1999, "Attack Trees: Modeling Security Threats," Dr. Dobbs Journal of Software Tools 24, 12, 21-29.
    • (1999) Dr. Dobbs Journal of Software Tools , vol.24 , Issue.12 , pp. 21-29
    • Schneier, B.1
  • 28
    • 32644456297 scopus 로고    scopus 로고
    • June Report of the Consortium for Research on Information Security and Policy, Center for International Security and Cooperation, Stanford University, California
    • Soo Hoo, K. J., June 2000, "How Much Is Enough? A Risk-Management Approach to Computer Security." Report of the Consortium for Research on Information Security and Policy, Center for International Security and Cooperation, Stanford University, California.
    • (2000) How Much Is Enough? A Risk-management Approach to Computer Security
    • Soo Hoo, K.J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.