메뉴 건너뛰기
.. 내서재 .. 알림
소속 기관/학교 인증
인증하면 논문, 학술자료 등을  무료로 열람할 수 있어요.
한국대학교, 누리자동차, 시립도서관 등 나의 기관을 확인해보세요
(국내 대학 90% 이상 구독 중)
로그인 회원가입 고객센터 ENG
주제분류

추천
검색
질문

논문 기본 정보

자료유형
학술저널
저자정보
Armaghan Behnia (Universiti Tekonologi Malaysia) Rafhana Abd Rashid (Universiti Tekonologi Malaysia) Junaid Ahsenali Chaudhry (Qatar University)
저널정보
한국산학기술학회 SmartCR Smart Computing Review 제2권 제1호
발행연도
2012.2
수록면
79 - 94 (16page)

이용수

표지
📌
연구주제
📖
연구배경
🔬
연구방법
🏆
연구결과
AI에게 요청하기
추천
검색
질문

초록· 키워드

오류제보하기
There are already many models of risk assessment and more are emerging every day. They all have the same fundamental target, but most attempt to hit the target from very different approaches. Some approaches can be applied to all types of risk, while others are specific to particular risks. A particularly dangerous risk in the global economy today is the security of information. Information is a key asset for organizations, and reducing the risk of information compromise is a high priority. This study proposed a methodology for information security risk analysis in which the assets, vulnerabilities, threats, and controls of an organization are linked. The main purpose of the study is to compare and clarify the different activities, inputs, and outputs required by each model of information security risk assessment and the analysis that effectively addresses the risks of information security. At the moment, there are numerous risk analysis methodologies available, some of which are qualitative while others are more quantitative in nature. These methodologies have a common goal to estimate the overall value of risk. An organization must choose the most proper methodology based on their specific requirements.

목차

Abstract
Introduction
Problem Definition
Preliminary Study
Choosing the Best Framework
Contribution of OCTAVE Case Study
PERFORMANCE EVALUATION
Conclusion
Future Research
References

참고문헌 (0)

참고문헌 신청

이 논문의 저자 정보

이 논문과 함께 이용한 논문

최근 본 자료

전체보기

댓글(0)

0

UCI(KEPA) : I410-ECN-0101-2015-500-002466064