Sciweavers

331 search results - page 15 / 67
» Assessing the Risk of IT Outsourcing
Sort
View
HICSS
2009
IEEE
213views Biometrics» more  HICSS 2009»
15 years 5 months ago
AURUM: A Framework for Information Security Risk Management
—As companies are increasingly exposed to a variety of information security threats, they are permanently forced to pay attention to security issues. Risk management provides an ...
Andreas Ekelhart, Stefan Fenz, Thomas Neubauer
ASIASIM
2004
Springer
15 years 4 months ago
A Security Risk Analysis Model for Information Systems
Abstract. Information security is a crucial technique for an organization to survive in these days. However, there is no integrated model to assess the security risk quantitatively...
Hoh Peter In, Young-Gab Kim, Taek Lee, Chang-Joo M...
EKNOW
2010
14 years 5 months ago
Workshop-Based Risk Assessment for the Definition of Secure Business Processes
Nowadays, industry and governments are faced with an increasing number of varying threats concerning the security of their valuable business processes. Due to the vast damage pote...
Thomas Neubauer, Markus Pehn
ISPEC
2005
Springer
15 years 4 months ago
Risk Assessment of Production Networks Using Honeynets - Some Practical Experience
: Threats for today’s production networks range from fully automated worms and viruses to targeted, highly sophisticated multi-phase attacks carried out manually. In order to pro...
Stephan Riebach, Erwin P. Rathgeb, Birger Töd...
ACSAC
2007
IEEE
15 years 5 months ago
Security Usability Principles for Vulnerability Analysis and Risk Assessment
Usability is the weakest link in the security chain of many prominent applications. A set of security usability principles should therefore be considered when designing and engine...
Audun Jøsang, Bander AlFayyadh, Tyrone Gran...