Abstract
Information security risk management is a fundamental process conducted for the purpose of securing information assets in an organization. It usually involves asset identification and valuation, threat analysis, risk analysis and implementation of countermeasures. A correct asset valuation is a basis for accurate risk analysis, but there is a lack of works describing the valuation process with respect to dependencies among assets. In this work we propose a method for inspecting asset dependencies, based on common security attributes - confidentiality, integrity and availability. Our method should bring more detailed outputs from the risk analysis and therefore make this process more objective. © 2014 IFIP International Federation for Information Processing.
Author supplied keywords
Cite
CITATION STYLE
Breier, J., & Schindler, F. (2014). Assets dependencies model in information security risk management. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8407 LNCS, pp. 405–412). Springer Verlag. https://doi.org/10.1007/978-3-642-55032-4_40
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.