Please use this identifier to cite or link to this item:
|Title:||Assets dependencies model in information security risk management||Authors:||Jakub, Breier
|Keywords:||DRNTU::Science::Physics||Issue Date:||2014||Source:||Jakub, B., & Frank, S. (2014). Assets dependencies model in information security risk management. Proceedings IFIP TC5/8 International Conference, ICT-EurAsia. Information and communication technology. Lecture notes in computer science 8407, 405-412.||metadata.dc.contributor.conference:||Proceedings on IFIP TC5/8 International Conference, ICT-EurAsia (2nd : 2014 : Bali, Indonesia)||Abstract:||Information security risk management is a fundamental process conducted for the purpose of securing information assets in an organization. It usually involves asset identification and valuation, threat analysis, risk analysis and implementation of countermeasures. A correct asset valuation is a basis for accurate risk analysis, but there is a lack of works describing the valuation process with respect to dependencies among assets. In this work we propose a method for inspecting asset dependencies, based on common security attributes - confidentiality, integrity and availability. Our method should bring more detailed outputs from the risk analysis and therefore make this process more objective.||URI:||https://hdl.handle.net/10356/101667
|DOI:||10.1007/978-3-642-55032-4||Schools:||School of Physical and Mathematical Sciences||Research Centres:||Temasek Laboratories||Rights:||© 2014 IFIP International Federation for Information Processing||Fulltext Permission:||none||Fulltext Availability:||No Fulltext|
|Appears in Collections:||SPMS Conference Papers|
Page view(s) 50530
Updated on May 28, 2023
Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.