Information Technology Risk Assessment: Octave-S Approach

  • Gunawan B
  • Merry M
  • Nelly N
N/ACitations
Citations of this article
34Readers
Mendeley users who have this article in their library.

Abstract

Purpose of the research is to identify the risk of IT in the company, to assess all the risk, and take security actions to solve the problem. Research methods used are data collection method and analysis method. Data collection is conducted with literature review and field studies by interview and observation. Analysis is conducted using Operationally Critical Threat, Asset, and Vulnerability (OCTAVE)-S method. The expected result is the risk identification in IT of the company.Index Terms - IT, Risk Assessment, Octave-S

Cite

CITATION STYLE

APA

Gunawan, B., Merry, M., & Nelly, N. (2011). Information Technology Risk Assessment: Octave-S Approach. CommIT (Communication and Information Technology) Journal, 5(1), 1. https://doi.org/10.21512/commit.v5i1.549

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free