2015
DOI: 10.1007/978-3-319-19243-7_42
|View full text |Cite
|
Sign up to set email alerts
|

Towards the ENTRI Framework: Security Risk Management Enhanced by the Use of Enterprise Architectures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
4
4
1

Relationship

1
8

Authors

Journals

citations
Cited by 19 publications
(10 citation statements)
references
References 23 publications
0
6
0
Order By: Relevance
“…At the same time, the level of such costs is directly dependent on the number and scale of the use of such mechanisms. Therefore, the inclusion of certain mechanisms for the neutralization of threats to the enterprise's economic security should come from the real level of this threat and be adequate to the costs of its removal (Mayer et al, 2015).…”
Section: Methodsmentioning
confidence: 99%
“…At the same time, the level of such costs is directly dependent on the number and scale of the use of such mechanisms. Therefore, the inclusion of certain mechanisms for the neutralization of threats to the enterprise's economic security should come from the real level of this threat and be adequate to the costs of its removal (Mayer et al, 2015).…”
Section: Methodsmentioning
confidence: 99%
“…In the same vein, [32] investigates and presents ways to use deep learning (DL) methods, including RL approaches, to improve methods for mobile crowd sensing and Zolotukhin et al [39] stress the fact that traditional IDS approaches are unsuitable for IoT networks due to two elements: the limited computational capacity of devices and the diversity of technology. Therefore, an RL agent is proposed as a core component of an IoT defense system in order to evaluate the risk of potential attacks [17] and mitigate them using the most optimal actions. In [10], to maintain the high-level security of data in the Cloud, RL is incorporated to the Reinforcement Learning Automata for detecting and classifying attacks [3].…”
Section: Literature Review and Analysismentioning
confidence: 99%
“…Management (EAM) contributes in addressing the information security governance. Also, they motivate the added value of EAM to improve security risk management [4], [23].…”
Section: Mayer Et Al Claim That a Connection Between Risk Managementmentioning
confidence: 99%
“…Besides, Enterprise Architecture (EA) is a holistic view of organizational, business, and technology architectures and their relationships [3]. Moreover, EA is widely accepted as an essential mechanism for ensuring agility and consistency, compliance and efficiency; it can also be regarded as a foundation of business continuity planning, service management, and security management [4], [5].…”
Section: Introductionmentioning
confidence: 99%