Risk assessment

0Citations
Citations of this article
435Readers
Mendeley users who have this article in their library.

Abstract

This chapter discusses risk, risk analysis, and risk evaluation in general terms but seen in relation to information security. The purpose is to give an overview over the process in general terms and provide guidance on how this is performed, irrespective of the methods chosen.

Cite

CITATION STYLE

APA

Haugen, S. (2011). Risk assessment. In A Multidisciplinary Introduction to Information Security (pp. 261–279). CRC Press. https://doi.org/10.21423/bovine-vol33no1p37-49

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free