Security Enhanced Applications for Information Systems 2012
DOI: 10.5772/38492
|View full text |Cite
|
Sign up to set email alerts
|

Construction of Effective Database System for Information Risk Mitigation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 6 publications
0
3
0
Order By: Relevance
“…They output a set of mitigation controls. A precise method to select effective risk mitigation measures is proposed in [17], and that for identifying information-related assets is in [18].…”
Section: Some Issues On Information Security Management and Policymentioning
confidence: 99%
“…They output a set of mitigation controls. A precise method to select effective risk mitigation measures is proposed in [17], and that for identifying information-related assets is in [18].…”
Section: Some Issues On Information Security Management and Policymentioning
confidence: 99%
“…We have proposed some system for evaluation of risks and find out a set of proper mitigation controls (Nagata et al 2009). To identify information related assets, we will prepare a list of possible ones (Nagata 2012).  On procedure stage after information risk analysis, summarize and document the procedures for each department, and the document will be completed after hearing the opinions of each department.…”
Section: Figure 1 Tree-layer Model For Information Security Policymentioning
confidence: 99%
“…The process making following steps: determine a threat path W; select controls by evaluating their initial mitigation degree dependent on W; define the desirable mitigation control a 0 , as an acceptable impacts and probability vector V 0 (v (i0) ,p); calculate for each element out its mitigation degree with respect to each of impacts and probability (by considering the type of assets, threat path, and impact or probability in some criteria); calculate aj= Vj(v(ij) ,p) as the alternative vectors; apply the fuzzy method; determine the set of effective mitigation controls. [13]…”
Section: Useful Toolsmentioning
confidence: 99%