2013
DOI: 10.1016/s1005-8885(13)60220-4
|View full text |Cite
|
Sign up to set email alerts
|

Knowledge-based information security risk assessment method

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 1 publication
0
3
0
Order By: Relevance
“…Shedden et al 26 utilized the structure of security risk for qualitative assessment of security risk of healthcare web application. Guan et al 27 proposed a fuzzy-based procedure for security risk evaluation and have used drawings for designing the security risk models.…”
Section: Related Workmentioning
confidence: 99%
“…Shedden et al 26 utilized the structure of security risk for qualitative assessment of security risk of healthcare web application. Guan et al 27 proposed a fuzzy-based procedure for security risk evaluation and have used drawings for designing the security risk models.…”
Section: Related Workmentioning
confidence: 99%
“…Moreover, for the sake of the non-specialist users who have lack of knowledge of information security, Ya-chi Chu et al classify assets into five types: hardware, software, information, people and services and present very detailed content for each type [30]. In addition, knowledge-based methods [32] are also an effective means of risk identification. Finally, Padyab et al present a genre-based method for identifying risk named GBM-OA (Genre based method-OCTAVE Allegro) [33].…”
Section: Risk Identificationmentioning
confidence: 99%
“…Current risk evaluation methods can be divided into knowledge-based methods [1], probabilistic based methods [2], AHP methods [3,4], model-based methods [5,6], fuzzy logic-based methods [7], attack graphs based methods [8,9]. However, these methods are usually limited to the information security evaluation technology, which only evaluate the risk of system components, rarely based on business risk perspective.…”
Section: Introductionmentioning
confidence: 99%