2021
DOI: 10.3390/encyclopedia1030050
|View full text |Cite
|
Sign up to set email alerts
|

Information Security Risk Assessment

Abstract: Information security risk assessment is an important part of enterprises’ management practices that helps to identify, quantify, and prioritize risks against criteria for risk acceptance and objectives relevant to the organization. Risk management refers to a process that consists of identification, management, and elimination or reduction of the likelihood of events that can negatively affect the resources of the information system to reduce security risks that potentially have the ability to affect the infor… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
27
0
3

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 29 publications
(30 citation statements)
references
References 29 publications
0
27
0
3
Order By: Relevance
“…The main focus of the qualitative risk assessment is the likelihood of an event rather than its statistical probability. These likelihoods are derived from analyzing the threats and vulnerabilities and then generating a qualitative value for the asset or assets that may be affected [25]. In this research, we chose OWASP risk rating methodology to provide a risk-based level challenge by determining the severity rating of each challenge that is classified into 3 levels which are medium, high, and critical.…”
Section: Originalitymentioning
confidence: 99%
“…The main focus of the qualitative risk assessment is the likelihood of an event rather than its statistical probability. These likelihoods are derived from analyzing the threats and vulnerabilities and then generating a qualitative value for the asset or assets that may be affected [25]. In this research, we chose OWASP risk rating methodology to provide a risk-based level challenge by determining the severity rating of each challenge that is classified into 3 levels which are medium, high, and critical.…”
Section: Originalitymentioning
confidence: 99%
“…In most cases, the assessment input data are utilized to acquire information concerning undesirable or unexpected occurrences that might threaten information security. Nevertheless, a common absence of sufficient statistics diminishes the relevance and precision of the outcome [1].…”
Section: Dmentioning
confidence: 99%
“…The qualitative technique is popular since it uses a simple scale with three risk assessment levels (low, medium, and high). Interviews with experts might be used for assessment [1]. Large companies and cities benefit the most from qualitative risk analysis using scenario models.…”
Section: Dmentioning
confidence: 99%
See 2 more Smart Citations