2011 14th International Conference on Network-Based Information Systems 2011
DOI: 10.1109/nbis.2011.31
|View full text |Cite
|
Sign up to set email alerts
|

On Clustering of Risk Mitigation Controls

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2012
2012
2012
2012

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 6 publications
0
2
0
Order By: Relevance
“…This method works under the assumption that there is a database of mitigation controls with some kind of vector whose entries are numerical values assigned to the attributes in OCTAVE's threat path. We also proposed a method for constructing that kind of database (Nagata, 2011 Table 2. Phase, Process, and Group of Steps in OCTAVE-S When proceeding in risk evaluation steps, the risk profile worksheet plays a big role in order to recognize the information related threat, and to evaluate the impact and the frequency the threat may cause.…”
Section: Phase3 Develop Security Strategy and Plansmentioning
confidence: 99%
“…This method works under the assumption that there is a database of mitigation controls with some kind of vector whose entries are numerical values assigned to the attributes in OCTAVE's threat path. We also proposed a method for constructing that kind of database (Nagata, 2011 Table 2. Phase, Process, and Group of Steps in OCTAVE-S When proceeding in risk evaluation steps, the risk profile worksheet plays a big role in order to recognize the information related threat, and to evaluate the impact and the frequency the threat may cause.…”
Section: Phase3 Develop Security Strategy and Plansmentioning
confidence: 99%
“…This method works under the assumption that there is a database of mitigation controls with some kind of vector whose entries are numerical values assigned to the attributes in OCTAVE's threat path. We also proposed a method for constructing that kind of database (Nagata, 2011). When proceeding in risk evaluation steps, the risk profile worksheet plays a big role in order to recognize the information related threat, and to evaluate the impact and the frequency the threat may cause.…”
Section: Octave Other Evaluation Systems Organization Evaluationmentioning
confidence: 99%