2023
DOI: 10.1007/s11704-023-1582-6
|View full text |Cite
|
Sign up to set email alerts
|

Towards an integrated risk analysis security framework according to a systematic analysis of existing proposals

Antonio Santos-Olmo,
Luis Enrique Sánchez,
David G. Rosado
et al.

Abstract: The information society depends increasingly on risk assessment and management systems as means to adequately protect its key information assets. The availability of these systems is now vital for the protection and evolution of companies. However, several factors have led to an increasing need for more accurate risk analysis approaches. These are: the speed at which technologies evolve, their global impact and the growing requirement for companies to collaborate. Risk analysis processes must consequently adap… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2025
2025

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(1 citation statement)
references
References 106 publications
0
1
0
Order By: Relevance
“…To overcome these limitations, in previous works, we have developed a methodology called "MARISMA" (Methodology for the Analysis of Risks in Information Systems using Meta-Patterns and Adaptability) [14] supported by a technological environment called "eMARISMA" (www.emarisma.com, accessed on 26 March 2024). MARISMA is a methodology based on the reuse of knowledge for RAM purposes using structures known as "patterns" that allow different types of cases to be supported.…”
Section: Introductionmentioning
confidence: 99%
“…To overcome these limitations, in previous works, we have developed a methodology called "MARISMA" (Methodology for the Analysis of Risks in Information Systems using Meta-Patterns and Adaptability) [14] supported by a technological environment called "eMARISMA" (www.emarisma.com, accessed on 26 March 2024). MARISMA is a methodology based on the reuse of knowledge for RAM purposes using structures known as "patterns" that allow different types of cases to be supported.…”
Section: Introductionmentioning
confidence: 99%