Proceedings. Sixth International Enterprise Distributed Object Computing
DOI: 10.1109/edoc.2002.1137696
|View full text |Cite
|
Sign up to set email alerts
|

Model-based risk assessment to improve enterprise security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
49
0
1

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 69 publications
(50 citation statements)
references
References 1 publication
0
49
0
1
Order By: Relevance
“…CRAMM (Bornman and Labuschagne, 2004;Yazar, 2002;Sarkheyli and Ithnin, 2010;Enterprise, 2005) ii. CORAS (Braber et al, 2007;Vorster and Labuschagne, 2005;Bornman and Labuschagne, 2004;Aagedal et al, 2002;Fredriksen et al, 2002;Raymond, 1993;Lund et al, 2011;Dahl, 2008;Refsdal, 2011a,b) iii. OCTAVE (Vorster and Labuschagne, 2005;Bornman and Labuschagne, 2004;Alberts et al, 2003;Sarkheyli and Ithnin, 2010;Albert and Dorofee, 2001;Alberts et al, 2001;Elky, 2006;Visintine, 2003) The reason for the selection of various types of methods for comparison is because they have been well documented.…”
Section: Information Security Risk Management Methodologiesmentioning
confidence: 99%
“…CRAMM (Bornman and Labuschagne, 2004;Yazar, 2002;Sarkheyli and Ithnin, 2010;Enterprise, 2005) ii. CORAS (Braber et al, 2007;Vorster and Labuschagne, 2005;Bornman and Labuschagne, 2004;Aagedal et al, 2002;Fredriksen et al, 2002;Raymond, 1993;Lund et al, 2011;Dahl, 2008;Refsdal, 2011a,b) iii. OCTAVE (Vorster and Labuschagne, 2005;Bornman and Labuschagne, 2004;Alberts et al, 2003;Sarkheyli and Ithnin, 2010;Albert and Dorofee, 2001;Alberts et al, 2001;Elky, 2006;Visintine, 2003) The reason for the selection of various types of methods for comparison is because they have been well documented.…”
Section: Information Security Risk Management Methodologiesmentioning
confidence: 99%
“…The same way to build the NPTs for nodes in the standard BBNs, we use description function to assign the probabilities covering all of the possible combinations of its parents. Residual_Vulnerability(v) (5) in Figure 6 (6) in Figure 6 In this situation, the instances of CM_Effectiveness(c,v) depend on the number of countermeasures which can mitigate this vulnerability in the given scenario, therefore, we must take the number of countermeasures into account. For example, as shown in Figure 10, if there are two countermeasures !C0 (entity identifier, begins with an exclamation point, represent an instance of an entity) and !C1 can mitigate the vulnerability !V.…”
Section: ) Building Mebn Model For Risk Assessmentmentioning
confidence: 99%
“…CORAS [5] and RiskManagement Framework [32] propose their own methodological steps, but lack specific guidelines to interoperate with C&A activities and appropriately utilize the evidences gathered for C&A requirements into the risk assessment process.…”
Section: Related Workmentioning
confidence: 99%
“…Another proposal is that of Aagedal et al [1], who developed the CORAS framework to produce an improved methodology for precise, unambiguous, and efficient risk analysis of security critical systems. CORAS focuses on the tight integration of viewpoint-oriented visual modelling in the risk assessment process, using an UML-based approach in the context of security and risk assessment.…”
Section: Related Workmentioning
confidence: 99%
“…The Business Layer consist of business related events and communications. This is the layer where the value of information assets is defined 1 . The IT Layer is the layer where the interconnections between IT assets are defined.…”
Section: Modelling Architecturementioning
confidence: 99%