2009
DOI: 10.1109/mitp.2009.62
|View full text |Cite
|
Sign up to set email alerts
|

Understanding Insecure IT: Practical Risk Assessment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2011
2011
2019
2019

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…We use the FRAP methodology only for the identification and evaluation of assets. Our usage of the FRAP methodology differs from the classical FRAP methodology described by Peltier (2008) in two points:The analyzed subject is not an IT system but the entire organization.The aim is not the identification of risks and controls but the identification of important assets and their exposure to risks.The asset evaluation phase is time‐consuming and labor intensive (Gerber and von Solms, 2005; Liu et al , 2009). The evaluation of assets using the FRAP methodology is very effective.…”
Section: The Use Of Frap Methodology For Asset Evaluationmentioning
confidence: 99%
“…We use the FRAP methodology only for the identification and evaluation of assets. Our usage of the FRAP methodology differs from the classical FRAP methodology described by Peltier (2008) in two points:The analyzed subject is not an IT system but the entire organization.The aim is not the identification of risks and controls but the identification of important assets and their exposure to risks.The asset evaluation phase is time‐consuming and labor intensive (Gerber and von Solms, 2005; Liu et al , 2009). The evaluation of assets using the FRAP methodology is very effective.…”
Section: The Use Of Frap Methodology For Asset Evaluationmentioning
confidence: 99%
“…There are two types of risk assessment methods which are qualitative and quantitative [15] [16]. The qualitative risk assessment method describes the magnitude of a threat impact to the organization and the probability of risk occurrence which is expressed using a multiplication function.…”
Section: E Risk Calculationmentioning
confidence: 99%