A Comprehensive Method to Assess Work System Security Risk

This article presents a comprehensive method to assess system security risks. The method includes a cohesive set of steps to not only identify a more complete set of security risks but also assess them in a systematic manner. The method is based on the integration of two kinds of models: (1) qualita...

Descripción completa

Guardado en:  
Detalles Bibliográficos
Autor principal: Dong, Tianxi (Autor)
Otros Autores: Yadav, Surya B.
Tipo de documento: Electrónico Libro
Lenguaje:Inglés
Publicado: 2014
En:Año: 2014
Acceso en línea: Volltext (kostenfrei)
Verificar disponibilidad: HBZ Gateway

MARC

LEADER 00000cam a22000002c 4500
001 1866332104
003 DE-627
005 20250121054905.0
007 cr uuu---uuuuu
008 231019s2014 xx |||||o 00| ||eng c
035 |a (DE-627)1866332104 
035 |a (DE-599)KXP1866332104 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
084 |a 2,1  |2 ssgn 
100 1 |a Dong, Tianxi  |e VerfasserIn  |4 aut 
245 1 2 |a A Comprehensive Method to Assess Work System Security Risk 
264 1 |c 2014 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
520 |a This article presents a comprehensive method to assess system security risks. The method includes a cohesive set of steps to not only identify a more complete set of security risks but also assess them in a systematic manner. The method is based on the integration of two kinds of models: (1) qualitative models emphasizing security risk factors and security requirement determination and (2) quantitative models that focus on formal evaluation and assessment of system security risks. Unlike most of the existing methods, the proposed method covers the whole process of system security risk assessment spanning all three phases—ascertainment of security requirements, measurement of evidence for security requirements, and evaluation of evidence against the needed security mechanisms. The article extends existing work on system security risk methods by incorporating new ideas of multifaceted security view and work system in a coherent set of steps. The article demonstrates the application of the proposed method to a real application and discusses the major results 
700 1 |a Yadav, Surya B.  |e VerfasserIn  |4 aut 
856 4 0 |u https://core.ac.uk/download/301376554.pdf  |x Verlag  |z kostenfrei  |3 Volltext 
935 |a mkri 
951 |a BO 
ELC |a 1 
LOK |0 000 xxxxxcx a22 zn 4500 
LOK |0 001 4392977838 
LOK |0 003 DE-627 
LOK |0 004 1866332104 
LOK |0 005 20231019043707 
LOK |0 008 231019||||||||||||||||ger||||||| 
LOK |0 035   |a (DE-2619)CORE17827778 
LOK |0 040   |a DE-2619  |c DE-627  |d DE-2619 
LOK |0 092   |o n 
LOK |0 852   |a DE-2619 
LOK |0 852 1  |9 00 
LOK |0 935   |a core 
OAS |a 1 
ORI |a SA-MARC-krimdoka001.raw