Third International Symposium on Information Assurance and Security 2007
DOI: 10.1109/ias.2007.76
|View full text |Cite
|
Sign up to set email alerts
|

Risk management in coalition networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2010
2010
2021
2021

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 5 publications
0
4
0
Order By: Relevance
“…Risk treatment allows one to eliminates the risk or reduces it to an acceptable level. Mees [32] defined four strategies for the risk treatment: Eliminate the risk by changing the way of carrying out an activity in order to prevent the triggering of an adverse event. Reduce the risk by implementing countermeasures likely to minimize the probability of occurrence of a risk or of mitigating its consequences.…”
Section: Risk Treatmentmentioning
confidence: 99%
“…Risk treatment allows one to eliminates the risk or reduces it to an acceptable level. Mees [32] defined four strategies for the risk treatment: Eliminate the risk by changing the way of carrying out an activity in order to prevent the triggering of an adverse event. Reduce the risk by implementing countermeasures likely to minimize the probability of occurrence of a risk or of mitigating its consequences.…”
Section: Risk Treatmentmentioning
confidence: 99%
“…Information security context, this domain name will help the research and application of system safety [7]. Say simply, is a set of safety domain of entities and resources environment a subset of the [5]. They have common security Settings.…”
Section: Related Definitionsmentioning
confidence: 99%
“…It has put forward a series of complete safety principles such as good structure transformation, into implementation [3], etc, and based on the establishment of security strategy. A the effectiveness of the security strategy, meet the system safety, this is a kind of information safety risk assessment process, usually through the model of the information security, affecting the assets of the user, and analyzes its vulnerability, threat and risk factors [4,5]. They mainly USES the economic indicators to measure loss [6], do not provide feedback existing security measures and their effectiveness report, lack of comprehensive consideration of the characteristics of the influence and effect of the security strategy.…”
Section: Introductionmentioning
confidence: 99%
“…Risk can have a major impact on the operation (Mees, 2007), whereas risk management (RM) involves a number necessary managerial processes that companies apply in managing and controlling risks in any projects. Furthermore, Management of risks by repetitive process that addresses the planning, analysis, implementation, control and supervision of the policies and measures of security policy implementation can reduce the risk (Suroso & Fakhrozi, 2018).…”
Section: Introductionmentioning
confidence: 99%