메뉴 건너뛰기




Volumn , Issue , 2007, Pages 67-73

A novel security risk evaluation for information systems

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SCIENCE; INFORMATION SCIENCE; INFORMATION SYSTEMS;

EID: 47349092109     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/FCST.2007.9     Document Type: Conference Paper
Times cited : (3)

References (20)
  • 3
    • 0002670359 scopus 로고    scopus 로고
    • Attack trees: Modeling security threats
    • Dec
    • B. Schneier. Attack trees: Modeling security threats. DrDobbs Journal, Dec., 1999
    • (1999) DrDobbs Journal
    • Schneier, B.1
  • 6
    • 47349104969 scopus 로고    scopus 로고
    • Mission Oriented Risk and Design Analysis for Critical Information Systems, Innovative Decisions, Inc
    • Technical Report 2004-02, September
    • Buckshaw, et al. Mission Oriented Risk and Design Analysis for Critical Information Systems, Innovative Decisions, Inc, Technical Report 2004-02, September, 2004.
    • (2004)
    • Buckshaw1
  • 7
    • 28044457328 scopus 로고    scopus 로고
    • Information Technology - Security Techniques - Code of Practice for Information Security Management,
    • ISO. ISO/IEC 17799
    • ISO. ISO/IEC 17799: Information Technology - Security Techniques - Code of Practice for Information Security Management, 2005
    • (2005)
  • 8
    • 47349108762 scopus 로고    scopus 로고
    • Gary Stoneburner, Alice Goguen, andAlexis Feringa. Risk Management Guide for Information Technology Systems. NIST Special Publication 800-30. July 2002
    • Gary Stoneburner, Alice Goguen, andAlexis Feringa. Risk Management Guide for Information Technology Systems. NIST Special Publication 800-30. July 2002
  • 9
    • 47349096732 scopus 로고    scopus 로고
    • BSI. BS7799 C Code of Practice for Information Security Management, British Standards Institute, 1999
    • BSI. BS7799 C Code of Practice for Information Security Management, British Standards Institute, 1999
  • 10
    • 47349123397 scopus 로고    scopus 로고
    • SSE-CMM Model Description Document Version 3.0. Carnegie Mellon University. June 15, 2003
    • SSE-CMM Model Description Document Version 3.0. Carnegie Mellon University. June 15, 2003
  • 11
    • 47349127289 scopus 로고    scopus 로고
    • Microsoft Corporation. The Microsoft Security Risk Management Guide v 1.1. October 25, 2004
    • Microsoft Corporation. The Microsoft Security Risk Management Guide v 1.1. October 25, 2004
  • 12
    • 47349127797 scopus 로고    scopus 로고
    • CRAMMV5C http://www.cramm.com/
    • CRAMMV5C http://www.cramm.com/
  • 13
    • 47349122890 scopus 로고    scopus 로고
    • COBRA C http://www.riskworld.net/
    • COBRA C http://www.riskworld.net/
  • 15
    • 47349118250 scopus 로고    scopus 로고
    • Callio Secura C http://www.callio.com/
    • , vol.100
  • 18
    • 47349099367 scopus 로고    scopus 로고
    • Mehmet Sahinoglu. Security Meter: A Practical Decision-Tree Model to Quantify Risk. IEEE Security & Privacy, pp. 14-24, May/June 2005 32, no. 8/9, pp. 365-376, 2004
    • Mehmet Sahinoglu. Security Meter: A Practical Decision-Tree Model to Quantify Risk. IEEE Security & Privacy, pp. 14-24, May/June 2005 Vol. 32, no. 8/9, pp. 365-376, 2004
  • 19
    • 14744281156 scopus 로고    scopus 로고
    • Toward Econometric Models of the Security Risk from Remote Attacks
    • January/February
    • Stuart E. Schechter. Toward Econometric Models of the Security Risk from Remote Attacks. IEEE Security & Privacy, January/February 2005: 40 - 44
    • (2005) IEEE Security & Privacy , pp. 40-44
    • Schechter, S.E.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.