Risk assessment model of information security SVRAMIS

被引:3
|
作者
机构
[1] Wu, De
[2] Liu, Sanyang
来源
Wu, D. (jump_wude@163.com) | 2013年 / Science Press卷 / 40期
关键词
Risk assessment;
D O I
10.3969/j.issn.1001-2400.2013.01.008
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [31] Taxonomy of information security risk assessment (ISRA)
    Shameli-Sendi, Alireza
    Aghababaei-Barzegar, Rouzbeh
    Cheriet, Mohamed
    COMPUTERS & SECURITY, 2016, 57 : 14 - 30
  • [32] On the role of the Facilitator in information security risk assessment
    Coles-Kemp, Lizzie
    Overill, Richard E.
    JOURNAL IN COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2007, 3 (02): : 143 - 148
  • [33] Information security risk assessment, aggregation, and mitigation
    Lenstra, A
    Voss, T
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2004, 3108 : 391 - 401
  • [34] A Study of Information Security Evaluation and Risk Assessment
    Li, Jingyi
    Chao, Shiwei
    Huo, Minxia
    2015 FIFTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION AND MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC), 2015, : 1909 - 1912
  • [35] Risk assessment of human error in information security
    Cheng, Xiang-Yun
    Wang, Ying-Mei
    Xu, Zi-Ling
    PROCEEDINGS OF 2006 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2006, : 3573 - +
  • [36] On the role of the Facilitator in information security risk assessment
    Lizzie Coles-Kemp
    Richard E. Overill
    Journal in Computer Virology, 2007, 3 (2): : 143 - 148
  • [37] A framework and tool for the assessment of information security risk, the reduction of information security cost and the sustainability of information security culture
    Govender S.G.
    Kritzinger E.
    Loock M.
    Personal and Ubiquitous Computing, 2021, 25 (05) : 927 - 940
  • [38] Collective information structuremodel for information security risk assessment (ISRA)
    University Tun Hussein Onn Malaysia , Johor, Malaysia
    不详
    不详
    J. Syst. Inf. Technol., 2 (193-219):
  • [39] Overview of Enterprise Information Needs in Information Security Risk Assessment
    Korman, Matus
    Ekstedt, Mathias
    Sommestad, Teodor
    Hallberg, Jonas
    Bengtsson, Johan
    PROCEEDINGS OF THE 2014 IEEE 18TH INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE (EDOC 2014), 2014, : 42 - 51
  • [40] Security Risk Assessment Model of Blockchain
    Qin C.-X.
    Guo B.
    Shen Y.
    Su H.
    Zhang Z.
    Zhou C.-M.
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2021, 49 (01): : 117 - 124