Please use this identifier to cite or link to this item:
Full metadata record
DC FieldValueLanguage
dc.contributor.authorJakub, Breieren
dc.contributor.authorFrank, Schindleren
dc.contributor.editorMahendra, Made Sudianaen
dc.contributor.editorNeuhold, Erich J.en
dc.contributor.editorTjoa, A Minen
dc.contributor.editorYou, Ilsunen
dc.identifier.citationJakub, B., & Frank, S. (2014). Assets dependencies model in information security risk management. Proceedings IFIP TC5/8 International Conference, ICT-EurAsia. Information and communication technology. Lecture notes in computer science 8407, 405-412.en
dc.description.abstractInformation security risk management is a fundamental process conducted for the purpose of securing information assets in an organization. It usually involves asset identification and valuation, threat analysis, risk analysis and implementation of countermeasures. A correct asset valuation is a basis for accurate risk analysis, but there is a lack of works describing the valuation process with respect to dependencies among assets. In this work we propose a method for inspecting asset dependencies, based on common security attributes - confidentiality, integrity and availability. Our method should bring more detailed outputs from the risk analysis and therefore make this process more objective.en
dc.rights© 2014 IFIP International Federation for Information Processingen
dc.titleAssets dependencies model in information security risk managementen
dc.typeConference Paperen
dc.contributor.schoolSchool of Physical and Mathematical Sciencesen
dc.contributor.conferenceProceedings on IFIP TC5/8 International Conference, ICT-EurAsia (2nd : 2014 : Bali, Indonesia)en
dc.contributor.researchTemasek Laboratoriesen
item.fulltextNo Fulltext-
Appears in Collections:SPMS Conference Papers

Page view(s) 50

Updated on May 28, 2023

Google ScholarTM




Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.