Please use this identifier to cite or link to this item:
https://hdl.handle.net/10356/101667
Title: | Assets dependencies model in information security risk management | Authors: | Jakub, Breier Frank, Schindler |
Keywords: | DRNTU::Science::Physics | Issue Date: | 2014 | Source: | Jakub, B., & Frank, S. (2014). Assets dependencies model in information security risk management. Proceedings IFIP TC5/8 International Conference, ICT-EurAsia. Information and communication technology. Lecture notes in computer science 8407, 405-412. | metadata.dc.contributor.conference: | Proceedings on IFIP TC5/8 International Conference, ICT-EurAsia (2nd : 2014 : Bali, Indonesia) | Abstract: | Information security risk management is a fundamental process conducted for the purpose of securing information assets in an organization. It usually involves asset identification and valuation, threat analysis, risk analysis and implementation of countermeasures. A correct asset valuation is a basis for accurate risk analysis, but there is a lack of works describing the valuation process with respect to dependencies among assets. In this work we propose a method for inspecting asset dependencies, based on common security attributes - confidentiality, integrity and availability. Our method should bring more detailed outputs from the risk analysis and therefore make this process more objective. | URI: | https://hdl.handle.net/10356/101667 http://hdl.handle.net/10220/23935 |
DOI: | 10.1007/978-3-642-55032-4 | Schools: | School of Physical and Mathematical Sciences | Research Centres: | Temasek Laboratories | Rights: | © 2014 IFIP International Federation for Information Processing | Fulltext Permission: | none | Fulltext Availability: | No Fulltext |
Appears in Collections: | SPMS Conference Papers |
Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.