Asset Valuation Method for Dependent Entities
Asset analysis and valuation are important parts of the information security risk management. Outputs they produce are used in the process of risk analysis that plays a key role in securing organi-zation's business processes. A correct analysis and valuation of assets should reveal not only the...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Article |
Language: | English |
Published: |
2017
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/83343 http://hdl.handle.net/10220/42540 http://isyou.info/jisis/vol4/no3/5.htm |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-83343 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-833432020-09-26T22:16:44Z Asset Valuation Method for Dependent Entities Breier, Jakub School of Physical and Mathematical Sciences Temasek Laboratories information security risk management risk analysis Asset analysis and valuation are important parts of the information security risk management. Outputs they produce are used in the process of risk analysis that plays a key role in securing organi-zation's business processes. A correct analysis and valuation of assets should reveal not only their importance for the organization, but also their relationships and dependencies between each other. There is a lack of works considering asset dependencies for the risk management purposes, this part is usually left for a subjective perception of a risk analyst, who should adjust the risk values in the end. In our work we propose a systematic approach for including asset dependencies in the asset valuation process. We inspect the relations between assets from the common security attributes point of view-confidentiality, integrity and availability. Our method should help to formalize the problem with dependent entities in the organization's model. Published version 2017-05-31T07:55:04Z 2019-12-06T15:20:23Z 2017-05-31T07:55:04Z 2019-12-06T15:20:23Z 2014 Journal Article Breier, J. (2014). Asset Valuation Method for Dependent Entities. Journal of Internet Services and Information Security, 4(3), 72-81. 2182-2069 https://hdl.handle.net/10356/83343 http://hdl.handle.net/10220/42540 http://isyou.info/jisis/vol4/no3/5.htm en Journal of Internet Services and Information Security © 2014 The Author(s). This is the author created version of a work that has been peer reviewed and accepted for publication in Journal of Internet Services and Information Security, published by Innovative Information Science & Technology Research Group (ISYOU) AND Institute of Engineering - Polytechnic of Porto (ISEP/IPP) on behalf of The Author(s). It incorporates referee’s comments but changes resulting from the publishing process, such as copyediting, structural formatting, may not be reflected in this document. The published version is available at: [http://isyou.info/jisis/vol4/no3/5.htm]. 10 p. application/pdf |
institution |
Nanyang Technological University |
building |
NTU Library |
country |
Singapore |
collection |
DR-NTU |
language |
English |
topic |
information security risk management risk analysis |
spellingShingle |
information security risk management risk analysis Breier, Jakub Asset Valuation Method for Dependent Entities |
description |
Asset analysis and valuation are important parts of the information security risk management. Outputs they produce are used in the process of risk analysis that plays a key role in securing organi-zation's business processes. A correct analysis and valuation of assets should reveal not only their importance for the organization, but also their relationships and dependencies between each other. There is a lack of works considering asset dependencies for the risk management purposes, this part is usually left for a subjective perception of a risk analyst, who should adjust the risk values in the end. In our work we propose a systematic approach for including asset dependencies in the asset valuation process. We inspect the relations between assets from the common security attributes point of view-confidentiality, integrity and availability. Our method should help to formalize the problem with dependent entities in the organization's model. |
author2 |
School of Physical and Mathematical Sciences |
author_facet |
School of Physical and Mathematical Sciences Breier, Jakub |
format |
Article |
author |
Breier, Jakub |
author_sort |
Breier, Jakub |
title |
Asset Valuation Method for Dependent Entities |
title_short |
Asset Valuation Method for Dependent Entities |
title_full |
Asset Valuation Method for Dependent Entities |
title_fullStr |
Asset Valuation Method for Dependent Entities |
title_full_unstemmed |
Asset Valuation Method for Dependent Entities |
title_sort |
asset valuation method for dependent entities |
publishDate |
2017 |
url |
https://hdl.handle.net/10356/83343 http://hdl.handle.net/10220/42540 http://isyou.info/jisis/vol4/no3/5.htm |
_version_ |
1681056479827722240 |