Fifth International Conference on Information Technology: New Generations (Itng 2008) 2008
DOI: 10.1109/itng.2008.163
|View full text |Cite
|
Sign up to set email alerts
|

Simon's Intelligence Phase for Security Risk Assessment in Web Applications

Abstract: Organizations in this digital era use automated Information Technology Systems to process their information in order to support their missions. Web Applications (WA) offer services for business processes that imply handling organization valuable information. Their requirements have become more complex so as to guarantee Information Security.Security Risk Assessment (SRA) plays a critical role in protecting an organization's information assets. The main query has to do with which is the best form to determine w… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2009
2009
2022
2022

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 3 publications
0
1
0
Order By: Relevance
“…We demonstrated the model's applicability to quantifying the cyber-risk score and articulated the cyber-risk score change in the presence of anomalous behaviour. Existing risk assessment models are driven by the IS community and IT systems [77][78][79][80], whereas methodologies such as the qualitative Hazard and Operability study (HAZOP) tend to focus on risks to personnel and equipment, not cybersecurity [81]. While individual maturity exists, a disconnect remains between Information Technology (IT) and Operational Technology (OT), particularly in ICS.…”
Section: Spear Framework's Application To the Cyber-riskmentioning
confidence: 99%
“…We demonstrated the model's applicability to quantifying the cyber-risk score and articulated the cyber-risk score change in the presence of anomalous behaviour. Existing risk assessment models are driven by the IS community and IT systems [77][78][79][80], whereas methodologies such as the qualitative Hazard and Operability study (HAZOP) tend to focus on risks to personnel and equipment, not cybersecurity [81]. While individual maturity exists, a disconnect remains between Information Technology (IT) and Operational Technology (OT), particularly in ICS.…”
Section: Spear Framework's Application To the Cyber-riskmentioning
confidence: 99%