2011 Information Security for South Africa 2011
DOI: 10.1109/issa.2011.6027534
|View full text |Cite
|
Sign up to set email alerts
|

A property based security risk analysis through weighted simulation

Abstract: Abstract-The estimation of security risks in complex information and communication technology systems is an essential part of risk management processes. A proper computation of risks requires a good knowledge about the probability distributions of different upcoming events or behaviours. Usually, technical risk assessment in Information Technology (IT) systems is concerned with threats to specific assets. However, for many scenarios it can be useful to consider the risk of the violation of particular security … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2012
2012
2019
2019

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 27 publications
0
3
0
Order By: Relevance
“…Examples of a simulation-based handling of safety without inclusion of security are [3,35]. Similar considerations from the security risk point of view were made in [15,23,25,63,79,90]. A simulation-based analysis of system models from the perspectives of both safety and security can be found in [11,18].…”
Section: Related Workmentioning
confidence: 87%
“…Examples of a simulation-based handling of safety without inclusion of security are [3,35]. Similar considerations from the security risk point of view were made in [15,23,25,63,79,90]. A simulation-based analysis of system models from the perspectives of both safety and security can be found in [11,18].…”
Section: Related Workmentioning
confidence: 87%
“…For example, as the traditional risk assessment method, the information technology‐security risk assessment is based on the likelihood of occurrence of a hazardous event and potential consequence caused by the event . Contemporary approaches often focus on requirements of confidentiality, integrity, and availability (CIA) and are mostly model or system‐based . The typical quantitative assessment methods include the Markov analysis, statistical parameter analysis, Bayesian network models, and clustering methods .…”
Section: Introductionmentioning
confidence: 99%
“…6,24 Contemporary approaches often focus on requirements of confidentiality, integrity, and availability (CIA) and are mostly model or system-based. [25][26][27] The typical quantitative assessment methods include the Markov analysis, statistical parameter analysis, Bayesian network models, 11,28 and clustering methods. 29 Quantitative methods aim to estimate the loss of assets, vulnerabilities of organization systems, frequency of threats, and cost of the risk.…”
Section: Introductionmentioning
confidence: 99%