메뉴 건너뛰기




Volumn , Issue , 2010, Pages 199-206

Business process-based information security risk assessment

Author keywords

Business process; Information management; Information security; Process management; Risk assessment; Risk management

Indexed keywords

BANKING INDUSTRY; BUSINESS GOALS; BUSINESS PROCESS; CRITICAL ASSET; INFORMATION SECURITY; INFORMATION SECURITY RISK ASSESSMENT; LIMITED INFORMATION; PROCESS MANAGEMENT; SECURITY LEVEL; SECURITY REQUIREMENTS; SECURITY RISK ASSESSMENTS;

EID: 78650393263     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/NSS.2010.37     Document Type: Conference Paper
Times cited : (19)

References (20)
  • 2
    • 17844396492 scopus 로고    scopus 로고
    • The economic approach of information security
    • T. Tsiakis and G. Stephanides, "The economic approach of information security," Computers & Security, vol.24, pp. 105-108, 2005.
    • (2005) Computers & Security , vol.24 , pp. 105-108
    • Tsiakis, T.1    Stephanides, G.2
  • 3
    • 17844381878 scopus 로고    scopus 로고
    • ISRAM: Information security risk analysis method
    • B. Karabacak and I.Sogukpinar "ISRAM: information security risk analysis method," Computers & Security, vol.24, pp. 147-159, 2005.
    • (2005) Computers & Security , vol.24 , pp. 147-159
    • Karabacak, B.1    Sogukpinar, I.2
  • 5
    • 38149131382 scopus 로고    scopus 로고
    • Risk assessment method based on business process-oriented asset evaluation for information system security
    • Springer
    • J. Eom, S. Park, Y. Han, T. Chung, "Risk Assessment Method Based on Business Process-Oriented Asset Evaluation for Information System Security," LECTURE NOTES IN COMPUTER SCIENCE, Springer, 2007.
    • (2007) Lecture Notes in Computer Science
    • Eom, J.1    Park, S.2    Han, Y.3    Chung, T.4
  • 10
    • 39749181513 scopus 로고    scopus 로고
    • Towards a standar approach for quantifying an ICT security investment
    • May
    • R Bojanc, B Jerman-Blazic, "Towards a standar approach for quantifying an ICT security investment," Computer Standards & Interfaces, v.30, n.4, pp. 216-222, May, 2008.
    • (2008) Computer Standards & Interfaces , vol.30 , Issue.4 , pp. 216-222
    • Bojanc, R.1    Jerman-Blazic, B.2
  • 14
    • 84903386529 scopus 로고    scopus 로고
    • Modelling system integrity of a security critical system using colored petri nets
    • Rome, Italy: WIT Press
    • S. Houmb and K. Sallhammar, "Modelling System Integrity of a Security Critical System Using Colored Petri Nets," in Proceeding of Safety and Security Engineering (SAFE 2005). Rome, Italy: WIT Press, 2005, pp. 3-12.
    • (2005) Proceeding of Safety and Security Engineering (SAFE 2005) , pp. 3-12
    • Houmb, S.1    Sallhammar, K.2
  • 20
    • 15744370034 scopus 로고    scopus 로고
    • A taxonomy of network and computer attacks
    • February
    • S. Hansman and R. Hunt, A taxonomy of network and computer attacks, Computers & Security, Volume 24, Issue 1, February 2005, Pages 31-43
    • (2005) Computers & Security , vol.24 , Issue.1 , pp. 31-43
    • Hansman, S.1    Hunt, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.