2003
DOI: 10.21236/ada634134
|View full text |Cite
|
Sign up to set email alerts
|

Introduction to the OCTAVE Approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
164
0
8

Year Published

2006
2006
2016
2016

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 201 publications
(172 citation statements)
references
References 0 publications
0
164
0
8
Order By: Relevance
“…CORAS (Braber et al, 2007;Vorster and Labuschagne, 2005;Bornman and Labuschagne, 2004;Aagedal et al, 2002;Fredriksen et al, 2002;Raymond, 1993;Lund et al, 2011;Dahl, 2008;Refsdal, 2011a,b) iii. OCTAVE (Vorster and Labuschagne, 2005;Bornman and Labuschagne, 2004;Alberts et al, 2003;Sarkheyli and Ithnin, 2010;Albert and Dorofee, 2001;Alberts et al, 2001;Elky, 2006;Visintine, 2003) The reason for the selection of various types of methods for comparison is because they have been well documented. The majority of ISRA methods are proprietary with very little publicly available information apart from marketing literature.…”
Section: Information Security Risk Management Methodologiesmentioning
confidence: 99%
See 1 more Smart Citation
“…CORAS (Braber et al, 2007;Vorster and Labuschagne, 2005;Bornman and Labuschagne, 2004;Aagedal et al, 2002;Fredriksen et al, 2002;Raymond, 1993;Lund et al, 2011;Dahl, 2008;Refsdal, 2011a,b) iii. OCTAVE (Vorster and Labuschagne, 2005;Bornman and Labuschagne, 2004;Alberts et al, 2003;Sarkheyli and Ithnin, 2010;Albert and Dorofee, 2001;Alberts et al, 2001;Elky, 2006;Visintine, 2003) The reason for the selection of various types of methods for comparison is because they have been well documented. The majority of ISRA methods are proprietary with very little publicly available information apart from marketing literature.…”
Section: Information Security Risk Management Methodologiesmentioning
confidence: 99%
“…Table 1 illustrates the list of ISRA methodologies issued by organizations. All the ISRA methodologies have been developed along with supporting tools and documentation that tailor security control implementations to organizations (Braber et al, 2007;Alberts et al, 2003;Stolen et al, 2002;Yazar, 2002).…”
Section: Background Of Risk Assessmentmentioning
confidence: 99%
“…In the approaches of InnerhoferOberperfler and Breu (Innerhofer-Oberperfler and Breu, 2006), Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE) (Alberts et al, 2003), OCTAVE Allegro (Caralli et al, 2007), conditions or situations that can threaten an organization's information assets" (Caralli et al, 2007): 18) can be used for vulnerability identification. In NIST SP 800-30 (Stoneburner et al, 2002), vulnerability knowledge bases, system security testing and a security requirements' checklist are all used for vulnerability identification.…”
Section: Related Workmentioning
confidence: 99%
“…This step depends on the risk methodologies used. Most of the existing methods rely on the combination on knowledge extracted from questionnaires and interviews [19] [20]. Others [10] [21], use predefined risk factors for each identified vulnerability, based on the estimation of experts who studied the likelihood of occurrence of vulnerability exploits.…”
Section: B Risk Identificationmentioning
confidence: 99%