Information systems require awareness of risks and a good understanding of vulnerabilities and their exploitations. In this paper, we propose a novel approach for the systematic as...
The idea of risk permeates the information security field. We use terms like ``risk management'', ``risk assessment'', ``risk model'' and ``risk analy...
The paper reports on a method for software risk assessments that takes into account “primary facts” and “secondary facts”. Primary facts are those obtained through automat...
Risk assessment in regions with low earthquake activity is important for reinsurance companies and governmental building authorities. They need a complete picture of the possible ...
The assessment and mitigation of risks related to the availability of the IT infrastructure is becoming increasingly important in modern organizations. Unfortunately, present stan...