2022
DOI: 10.11591/eei.v11i1.3241
|View full text |Cite
|
Sign up to set email alerts
|

Risk assessment in fleet management system using OCTAVE allegro

Abstract: The purpose of this study is to use the OCTAVE allegro methodology to identify risks in fleet management system (FMS), determine prioritized risks to be mitigated, provide mitigation recommendations for these prioritized risks, and shows how effective the recommendation is. The result of this study is expected to become an input for FMS service provider of possible risks in FMS services, and risk mitigation approaches that can be used to handle those risks. This risk assessment has successfully identified 6 cr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 20 publications
0
1
0
Order By: Relevance
“…Current security practices. As reported by the author [14] regarding digitalization and the new and major types of cyberattack in Peru's commercial sector, the current security practices are preventive measures against any type of cyberattacks and when this happens, the IT manager should be prepared to face them.…”
Section: Figure 2 Identify Business Knowledgementioning
confidence: 99%
“…Current security practices. As reported by the author [14] regarding digitalization and the new and major types of cyberattack in Peru's commercial sector, the current security practices are preventive measures against any type of cyberattacks and when this happens, the IT manager should be prepared to face them.…”
Section: Figure 2 Identify Business Knowledgementioning
confidence: 99%
“…For both OCTAVE and OCTAVE-S, the following three stages need to be fulfilled: building asset-based threat profiles, identifying infrastructure vulnerabilities, and developing a security strategy and plans [42]. To identify existing threats, a threat profile is created for each critical asset in the organization using a threat-tree approach [42]. Figure 5 shows the tree structure of the OCTAVE methods, which is used for each asset currently in an organization.…”
Section: Octavementioning
confidence: 99%
“…Figure 5 shows the tree structure of the OCTAVE methods, which is used for each asset currently in an organization. The vulnerability, threat agent, attacker purpose, and effect of the attack on the asset are all identified using the tree structure [42]. The goal of the OA is the same as that of OCTAVE and OCTAVE-S, but it has the additional benefit of targeting the information assets [43].…”
Section: Octavementioning
confidence: 99%
“…OCTAVE Allegro [39,40] is a version of the OCTAVE approach, which is a comprehensive evaluation of an organization's operational risk environment that yields improved results without requiring extensive risk assessment experience. In [41], the authors utilized the OCTAVE allegro methodology to identify risks in the fleet management system (FMS), identified and ranked the risks to be mitigated, presented mitigation recommendations, and demonstrated the solution's effectiveness. In [42], the authors utilized the OCTAVE allegro approach to evaluate the information system risk at the ed-tech organization to determine the risk mitigation priorities.…”
Section: Related Workmentioning
confidence: 99%