Information Security Risk Assessment A Practical Approach with a Mathematical Formulation of Risk

  • Ghazouani M
  • Faris S
  • Medromi H
  • et al.
N/ACitations
Citations of this article
62Readers
Mendeley users who have this article in their library.

Abstract

Risk management methodologies, such as Mehari, Ebios, CRAMM and SP 800-30 (NIST) use a common step based on threat, vulnerability and probability witch are typically evaluated intuitively using verbal hazard scales such as low, medium, high. Because of their subjectivity, these categories are extremely difficult to assign to threats, vulnerabilities and probability, or indeed, to interpret with any degree of confidence. The purpose of the paper is to propose a mathematical formulation of risk by using a lower level of granularity of its elements: threat, probability, criteria used to determine an asset's value, exposure, frequency and existing protection measure. General Terms Security risk assessment, risk management system, framework, audit, information system.

Cite

CITATION STYLE

APA

Ghazouani, M., Faris, S., Medromi, H., & Sayouti, A. (2014). Information Security Risk Assessment A Practical Approach with a Mathematical Formulation of Risk. International Journal of Computer Applications, 103(8), 36–42. https://doi.org/10.5120/18097-9155

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free