2015
DOI: 10.4018/ijeis.2015100103
|View full text |Cite
|
Sign up to set email alerts
|

A Weighted Monte Carlo Simulation Approach to Risk Assessment of Information Security Management System

Abstract: In recent decades, information has become a critical asset to various organizations, hence identifying and preventing the loss of information are becoming competitive advantages for firms. Many international standards have been developed to help organizations to maintain their competitiveness by applying risk assessment and information security management system and keep risk level as low as possible. This study aims to propose a new quantitative risk analysis and assessment methodology which is based on AHP a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 18 publications
(6 citation statements)
references
References 25 publications
0
6
0
Order By: Relevance
“…, then" rules. The method for assessing the critical threats, assets and vulnerabilities OCTAVE (Operationally Critical Threat, Asset, and Vulnerability Evaluation) is a methodology based on strategic risk assessment (Bamakan and Dehghanimohammadabadi, 2015).…”
Section: Literature Review Of Methods For Risk Assessmentmentioning
confidence: 99%
“…, then" rules. The method for assessing the critical threats, assets and vulnerabilities OCTAVE (Operationally Critical Threat, Asset, and Vulnerability Evaluation) is a methodology based on strategic risk assessment (Bamakan and Dehghanimohammadabadi, 2015).…”
Section: Literature Review Of Methods For Risk Assessmentmentioning
confidence: 99%
“…These parameters play a central role in the generic TVC methodology (Washington, 2009), which underlies many existing security risk assessment frameworks, and is used to manage risks in a wide range of organizations. Security risk assessment is also done by methods based on game theory (Brown, Sinha, Schlenker, & Tambe, 2016;Farraj, Hammad, Al Daoud, & Kundur, 2016;Pita et al, 2008), graph theory (Schneier, 1999), the bowtie method (de Ruijter & Guldenmund, 2016), probabilistic tools (Bamakan & Dehghanimohammadabadi, 2015;Chawdhry, 2009) and red-teaming, i.e., real-life simulation of a threat scenario.…”
Section: Measuring Airport Security Checkpoint Performancementioning
confidence: 99%
“…The tool utilises Monte Carlo method to support evidence-based risk assessment and management, in furtherance of justifying appropriate countermeasures. The work in [35] presents a different approach to information security assessment based on analytic hierarchy process (AHP) and Monte Carlo simulation. In particular, the approach applies weight elements to the confidentiality, integrity and availability of information assets in order to improve the accuracy of results.…”
Section: Related Workmentioning
confidence: 99%