Information Security Risk Management 2011
DOI: 10.1007/978-3-8348-9870-8_4
|View full text |Cite
|
Sign up to set email alerts
|

ISO 27005 und BSI IT-Grundschutz

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2019
2019
2019
2019

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(4 citation statements)
references
References 0 publications
0
4
0
Order By: Relevance
“…There are several ways to elicit the risk. There are several sources of Information security that enlist the current and past risks that can effect on information security [34]. Furthermore, the Information Security Risk Assessment team also elicit real time risks from the Information System.…”
Section: Risk Elicitationmentioning
confidence: 99%
See 3 more Smart Citations
“…There are several ways to elicit the risk. There are several sources of Information security that enlist the current and past risks that can effect on information security [34]. Furthermore, the Information Security Risk Assessment team also elicit real time risks from the Information System.…”
Section: Risk Elicitationmentioning
confidence: 99%
“…It is the task in which significance of each risk is evaluated, each risk mitigation process is prioritized in the light of its severity and cost [34].…”
Section: Risk Prioritizationmentioning
confidence: 99%
See 2 more Smart Citations