Assets dependencies model in information security risk management
Information security risk management is a fundamental process conducted for the purpose of securing information assets in an organization. It usually involves asset identification and valuation, threat analysis, risk analysis and implementation of countermeasures. A correct asset valuation is a basi...
Saved in:
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Conference or Workshop Item |
Language: | English |
Published: |
2014
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/101667 http://hdl.handle.net/10220/23935 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-101667 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-1016672020-03-07T12:31:20Z Assets dependencies model in information security risk management Jakub, Breier Frank, Schindler Linawati, Mahendra, Made Sudiana Neuhold, Erich J. Tjoa, A Min You, Ilsun School of Physical and Mathematical Sciences Proceedings on IFIP TC5/8 International Conference, ICT-EurAsia (2nd : 2014 : Bali, Indonesia) Temasek Laboratories DRNTU::Science::Physics Information security risk management is a fundamental process conducted for the purpose of securing information assets in an organization. It usually involves asset identification and valuation, threat analysis, risk analysis and implementation of countermeasures. A correct asset valuation is a basis for accurate risk analysis, but there is a lack of works describing the valuation process with respect to dependencies among assets. In this work we propose a method for inspecting asset dependencies, based on common security attributes - confidentiality, integrity and availability. Our method should bring more detailed outputs from the risk analysis and therefore make this process more objective. 2014-10-01T04:23:30Z 2019-12-06T20:42:31Z 2014-10-01T04:23:30Z 2019-12-06T20:42:31Z 2014 2014 Conference Paper Jakub, B., & Frank, S. (2014). Assets dependencies model in information security risk management. Proceedings IFIP TC5/8 International Conference, ICT-EurAsia. Information and communication technology. Lecture notes in computer science 8407, 405-412. https://hdl.handle.net/10356/101667 http://hdl.handle.net/10220/23935 10.1007/978-3-642-55032-4 179055 en © 2014 IFIP International Federation for Information Processing |
institution |
Nanyang Technological University |
building |
NTU Library |
country |
Singapore |
collection |
DR-NTU |
language |
English |
topic |
DRNTU::Science::Physics |
spellingShingle |
DRNTU::Science::Physics Jakub, Breier Frank, Schindler Assets dependencies model in information security risk management |
description |
Information security risk management is a fundamental process conducted for the purpose of securing information assets in an organization. It usually involves asset identification and valuation, threat analysis, risk analysis and implementation of countermeasures. A correct asset valuation is a basis for accurate risk analysis, but there is a lack of works describing the valuation process with respect to dependencies among assets. In this work we propose a method for inspecting asset dependencies, based on common security attributes - confidentiality, integrity and availability. Our method should bring more detailed outputs from the risk analysis and therefore make this process more objective. |
author2 |
Linawati, |
author_facet |
Linawati, Jakub, Breier Frank, Schindler |
format |
Conference or Workshop Item |
author |
Jakub, Breier Frank, Schindler |
author_sort |
Jakub, Breier |
title |
Assets dependencies model in information security risk management |
title_short |
Assets dependencies model in information security risk management |
title_full |
Assets dependencies model in information security risk management |
title_fullStr |
Assets dependencies model in information security risk management |
title_full_unstemmed |
Assets dependencies model in information security risk management |
title_sort |
assets dependencies model in information security risk management |
publishDate |
2014 |
url |
https://hdl.handle.net/10356/101667 http://hdl.handle.net/10220/23935 |
_version_ |
1681044067867164672 |