Please use this identifier to cite or link to this item:
Title: Assets dependencies model in information security risk management
Authors: Jakub, Breier
Frank, Schindler
Keywords: DRNTU::Science::Physics
Issue Date: 2014
Source: Jakub, B., & Frank, S. (2014). Assets dependencies model in information security risk management. Proceedings IFIP TC5/8 International Conference, ICT-EurAsia. Information and communication technology. Lecture notes in computer science 8407, 405-412.
metadata.dc.contributor.conference: Proceedings on IFIP TC5/8 International Conference, ICT-EurAsia (2nd : 2014 : Bali, Indonesia)
Abstract: Information security risk management is a fundamental process conducted for the purpose of securing information assets in an organization. It usually involves asset identification and valuation, threat analysis, risk analysis and implementation of countermeasures. A correct asset valuation is a basis for accurate risk analysis, but there is a lack of works describing the valuation process with respect to dependencies among assets. In this work we propose a method for inspecting asset dependencies, based on common security attributes - confidentiality, integrity and availability. Our method should bring more detailed outputs from the risk analysis and therefore make this process more objective.
DOI: 10.1007/978-3-642-55032-4
Schools: School of Physical and Mathematical Sciences 
Research Centres: Temasek Laboratories 
Rights: © 2014 IFIP International Federation for Information Processing
Fulltext Permission: none
Fulltext Availability: No Fulltext
Appears in Collections:SPMS Conference Papers

Page view(s) 50

Updated on May 28, 2023

Google ScholarTM




Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.