2017 Second International Conference on Informatics and Computing (ICIC) 2017
DOI: 10.1109/iac.2017.8280541
|View full text |Cite
|
Sign up to set email alerts
|

Risk-assessment based academic information System security policy using octave Allegro and ISO 27002

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(7 citation statements)
references
References 1 publication
0
7
0
Order By: Relevance
“…Especially for the FRAP method, the author of the FRAP method, explicitly stated that the FRAP method is not designed to assess the compliance of security requirements. [13], [14], [15], [20], [24] Qualita tive Both the FRAP and OCTAVE method is implemented to meet the business need and requires less time and resources. As mentioned earlier, the OCTAVE method has eight steps and needs knowledge from three levelssenior management, operational area management and staff.…”
Section: The Central Risk Analysis and Management Methods (Cramm)mentioning
confidence: 99%
“…Especially for the FRAP method, the author of the FRAP method, explicitly stated that the FRAP method is not designed to assess the compliance of security requirements. [13], [14], [15], [20], [24] Qualita tive Both the FRAP and OCTAVE method is implemented to meet the business need and requires less time and resources. As mentioned earlier, the OCTAVE method has eight steps and needs knowledge from three levelssenior management, operational area management and staff.…”
Section: The Central Risk Analysis and Management Methods (Cramm)mentioning
confidence: 99%
“…Security requirements have been widely studied for IT applications, e.g., (Dalpiaz et al 2016;Haley et al 2008;Ionita and Wieringa 2016;Jufri et al 2017;Li 2017;Meier et al 2003;Myagmar et al 2005;Schmitt and Liggesmeyer 2015;Sihwi et al 2016;Sindre and Opdahl 2005;Türpe 2017;Yu et al 2015). The most closely related research threads to our work are those concerned with early-stage security risk analysis.…”
Section: Security Requirements Engineeringmentioning
confidence: 99%
“…A risk is a critical vulnerability that leads to discrepancies in the application of information technology. The System's risk exposure was reviewed with respect to the confidentiality, integrity, and availability [6] [7].…”
Section: Literature Reviewmentioning
confidence: 99%