A model for asset valuation in security risk analysis regarding assets' dependencies
暂无分享,去创建一个
[1] Ewald F. Fuchs,et al. Influence of harmonics on power distribution system protection , 1988 .
[2] Tai-Myung Chung,et al. Risk Assessment Method Based on Business Process-Oriented Asset Evaluation for Information System Security , 2007, International Conference on Computational Science.
[3] Ingoo Han,et al. The IS risk analysis based on a business model , 2003, Inf. Manag..
[4] Sandro Etalle,et al. Model-Based Mitigation of Availability Risks , 2007, 2007 2nd IEEE/IFIP International Workshop on Business-Driven IT Management.
[5] Ralph Spencer Poore,et al. Valuing Information Assets for Security Risk Management , 2000, Inf. Secur. J. A Glob. Perspect..
[6] P. Eng,et al. Asset Valuation Technique for Network Management and Security , 2006, Sixth IEEE International Conference on Data Mining - Workshops (ICDMW'06).
[7] Ruth Breu,et al. Using an Enterprise Architecture for IT Risk Management , 2006, ISSA.
[8] Tai-Myung Chung,et al. Two-Dimensional Qualitative Asset Analysis Method based on Business Process-Oriented Asset Evaluation , 2005, J. Inf. Process. Syst..
[9] G. Stoneburner,et al. Risk Management Guide for Information Technology Systems: Recommendations of the National Institute of Standards and Technology , 2002 .