Assets dependencies model in information security risk management

Information security risk management is a fundamental process conducted for the purpose of securing information assets in an organization. It usually involves asset identification and valuation, threat analysis, risk analysis and implementation of countermeasures. A correct asset valuation is a basi...

Full description

Saved in:
Bibliographic Details
Main Authors: Jakub, Breier, Frank, Schindler
Other Authors: Linawati
Format: Conference or Workshop Item
Language:English
Published: 2014
Subjects:
Online Access:https://hdl.handle.net/10356/101667
http://hdl.handle.net/10220/23935
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-101667
record_format dspace
spelling sg-ntu-dr.10356-1016672020-03-07T12:31:20Z Assets dependencies model in information security risk management Jakub, Breier Frank, Schindler Linawati, Mahendra, Made Sudiana Neuhold, Erich J. Tjoa, A Min You, Ilsun School of Physical and Mathematical Sciences Proceedings on IFIP TC5/8 International Conference, ICT-EurAsia (2nd : 2014 : Bali, Indonesia) Temasek Laboratories DRNTU::Science::Physics Information security risk management is a fundamental process conducted for the purpose of securing information assets in an organization. It usually involves asset identification and valuation, threat analysis, risk analysis and implementation of countermeasures. A correct asset valuation is a basis for accurate risk analysis, but there is a lack of works describing the valuation process with respect to dependencies among assets. In this work we propose a method for inspecting asset dependencies, based on common security attributes - confidentiality, integrity and availability. Our method should bring more detailed outputs from the risk analysis and therefore make this process more objective. 2014-10-01T04:23:30Z 2019-12-06T20:42:31Z 2014-10-01T04:23:30Z 2019-12-06T20:42:31Z 2014 2014 Conference Paper Jakub, B., & Frank, S. (2014). Assets dependencies model in information security risk management. Proceedings IFIP TC5/8 International Conference, ICT-EurAsia. Information and communication technology. Lecture notes in computer science 8407, 405-412. https://hdl.handle.net/10356/101667 http://hdl.handle.net/10220/23935 10.1007/978-3-642-55032-4 179055 en © 2014 IFIP International Federation for Information Processing
institution Nanyang Technological University
building NTU Library
country Singapore
collection DR-NTU
language English
topic DRNTU::Science::Physics
spellingShingle DRNTU::Science::Physics
Jakub, Breier
Frank, Schindler
Assets dependencies model in information security risk management
description Information security risk management is a fundamental process conducted for the purpose of securing information assets in an organization. It usually involves asset identification and valuation, threat analysis, risk analysis and implementation of countermeasures. A correct asset valuation is a basis for accurate risk analysis, but there is a lack of works describing the valuation process with respect to dependencies among assets. In this work we propose a method for inspecting asset dependencies, based on common security attributes - confidentiality, integrity and availability. Our method should bring more detailed outputs from the risk analysis and therefore make this process more objective.
author2 Linawati,
author_facet Linawati,
Jakub, Breier
Frank, Schindler
format Conference or Workshop Item
author Jakub, Breier
Frank, Schindler
author_sort Jakub, Breier
title Assets dependencies model in information security risk management
title_short Assets dependencies model in information security risk management
title_full Assets dependencies model in information security risk management
title_fullStr Assets dependencies model in information security risk management
title_full_unstemmed Assets dependencies model in information security risk management
title_sort assets dependencies model in information security risk management
publishDate 2014
url https://hdl.handle.net/10356/101667
http://hdl.handle.net/10220/23935
_version_ 1681044067867164672