scholarly journals Problem Analysis of Traditional IT-Security Risk Assessment Methods – An Experience Report from the Insurance and Auditing Domain

Author(s):  
Stefan Taubenberger ◽  
Jan Jürjens ◽  
Yijun Yu ◽  
Bashar Nuseibeh
2016 ◽  
Vol 56 ◽  
pp. 1-27 ◽  
Author(s):  
Yulia Cherdantseva ◽  
Pete Burnap ◽  
Andrew Blyth ◽  
Peter Eden ◽  
Kevin Jones ◽  
...  

2011 ◽  
Vol 130-134 ◽  
pp. 3726-3730
Author(s):  
Ya Ling Yang ◽  
Yan Hui Zhou

Risk assessment for information security is uncertainty. To control these uncertainties is of great significance for effective risk assessment [1].There are many assessment methods, and the conclusions from them are less clear. This paper presents a fuzzy logic based information security risk assessment method FLISRAM. In this method, the results are from a comprehensive assessment for assets, threats and vulnerabilities of the information system.


2014 ◽  
Vol 73 (2) ◽  
Author(s):  
Sameer Hasan Albakri ◽  
Bharanidharan Shanmugam ◽  
Ganthan Narayana Samy ◽  
Norbik Bashah Idris ◽  
Azuan Ahmed

The term “Cloud Computing” has become very common in our daily life. Cloud computing has emerged with promises to decrease the cost of computing implementation and deliver the computing as service, where the clients pay only for what he needed and used. However, due to the new structure of the cloud computing model, several security concerns have been raised and many other security threats have been needed to be reevaluated according to the cloud structure. Besides, the traditional security risk assessment methods become unfit for cloud computing model due to its new distinguished characteristics. In this paper, we analysis the traditional information security risk assessment methods’ ability to assess the security risks in cloud computing environments.  


Sign in / Sign up

Export Citation Format

Share Document