2007
DOI: 10.1007/978-3-540-72588-6_165
|View full text |Cite
|
Sign up to set email alerts
|

Risk Assessment Method Based on Business Process-Oriented Asset Evaluation for Information System Security

Abstract: Abstract. We presented risk assessment methodology focused on business-process oriented asset evaluation and qualitative risk analysis method. The business process-oriented asset evaluation is to evaluate asset's value by the degree of asset contribution related to business process. Namely, asset's value is different according to the importance of department to which asset belongs, the contribution of asset's business, and security safeguard, etc. We proposed new asset's value evaluation applied to the weight … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2009
2009
2018
2018

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(8 citation statements)
references
References 2 publications
0
8
0
Order By: Relevance
“…Compared to the existing risk evaluation, the system in the paper has the following advantages:(1) The quantified risk value can present the fairly accurate risk value. (2) The improved AHP method is used to calculate the primary and second layer factors in network security system, which enhances the evaluation accuracy. (3) New evaluation factor system is constructed.…”
Section: Discussionmentioning
confidence: 99%
“…Compared to the existing risk evaluation, the system in the paper has the following advantages:(1) The quantified risk value can present the fairly accurate risk value. (2) The improved AHP method is used to calculate the primary and second layer factors in network security system, which enhances the evaluation accuracy. (3) New evaluation factor system is constructed.…”
Section: Discussionmentioning
confidence: 99%
“…Eom, Park and Han introduced a risk assessment method based on asset valuation and quantification [19]. Baudrit and Dubios proposed a risk assessment method taking into account two types of uncertainty: randomness and imprecision [6].…”
Section: Overview Of Risk Assessment Methodologiesmentioning
confidence: 99%
“…Han et al (2004) described an expansible vulnerability model in order to qualitatively assess the security of an active network and active nodes, aiming at solving a problem that is more suited for an active network than a traditional one. Eom et al (2007) introduced a risk assessment method based on asset valuation and quantification. Baudrit et al (2006) proposed a risk assessment method of node transmission and possibility exposure.…”
Section: Related Workmentioning
confidence: 99%