2017
DOI: 10.32890/jict2017.16.2.1
|View full text |Cite
|
Sign up to set email alerts
|

Military-Based Cyber Risk Assessment Framework for Supporting Cyber Warfare in Thailand

Abstract: Information Technology (IT) Risk Management is designed to confirm the sufficiency of information security. There are many risk management/assessment standards, e.g. IS0 27005:2011 and NIST SP 800-30rev1, which are mainly designed for general organizations such as governments or businesses. Cyber risk assessment focused on military strategy has been rarely studied. Hence, this paper presents an innovative cyber risk assessment conceptual framework named "Cyber Risk Assessment (CRA)" which is extended from prev… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 6 publications
0
2
0
Order By: Relevance
“…Cloud Based Univ Tech Sydney,AU [37] Optimization Bi-level MILP Hunan Univ,CN & Illinois Inst Tech,US [99]; New York Univ,USA [34] Markov chains -Dyn Prog Beijing Inst Tech,CN [117]; Univ Wisconsin,US & Univ Toledo,US & ATSEC Informat Secur Corp,US [114] Min-Max Multi-obj Queen Mary Univ London,UK [136] Parametric fb linearization Univ Toronto,CA [104] Semi-Definite Programming Univ Calif Berkeley,US & KTH Royal Inst Tech,SE [108] Stochastic model IBM Corp,US & Southern Method Univ, US [33] Qualitative Rational Choice perspective Temple Univ,US [63] Vulnerability detection Rangsit Univ,TH [52] Risk Assess.…”
Section: Bi-linear Differential Qualitymentioning
confidence: 99%
“…Cloud Based Univ Tech Sydney,AU [37] Optimization Bi-level MILP Hunan Univ,CN & Illinois Inst Tech,US [99]; New York Univ,USA [34] Markov chains -Dyn Prog Beijing Inst Tech,CN [117]; Univ Wisconsin,US & Univ Toledo,US & ATSEC Informat Secur Corp,US [114] Min-Max Multi-obj Queen Mary Univ London,UK [136] Parametric fb linearization Univ Toronto,CA [104] Semi-Definite Programming Univ Calif Berkeley,US & KTH Royal Inst Tech,SE [108] Stochastic model IBM Corp,US & Southern Method Univ, US [33] Qualitative Rational Choice perspective Temple Univ,US [63] Vulnerability detection Rangsit Univ,TH [52] Risk Assess.…”
Section: Bi-linear Differential Qualitymentioning
confidence: 99%
“…Due to the extended application of computers in financial, mechanical, military and individual exercises, a stringent framework to safeguard the storage of essential data has never been more imperative (Hemanidhi & Chimmanee, 2017;Hussien, Muda, & Yasin, 2018). Unauthorized access to log into secure systems can lead to significant financial misfortune, hence it is mandatory to construct high quality security measures in these computer networks (Mihajlov, Jerman-Blažič, & Ciunova Shuleska, 2016;Mohsin, Bakar, Hamdan, & Abdul, 2018).…”
Section: Introductionmentioning
confidence: 99%