• No results found

information security risk assessment (ISRA)

A conceptual framework of info structure for information security risk assessment (ISRA)

A conceptual framework of info structure for information security risk assessment (ISRA)

... Information security has become a vital entity to most organizations today due to current trends in information transfer through a borderless and vulnerable ...in information security ...

8

Collective information structure model for Information Security Risk Assessment (ISRA)

Collective information structure model for Information Security Risk Assessment (ISRA)

... to information security risk assessment ...complete information would encourage in making a plan that leads to a clear direction, and ultimately help to make decisions that lead to ...

27

Method of Information Security Risk Assessment Based on Improved Fuzzy Theory of Evidence

Method of Information Security Risk Assessment Based on Improved Fuzzy Theory of Evidence

... of information security risk ...systems risk assessment was established firstly, and then fuzzy sets were introduced into theory of ...the risk control strategy of the in- ...

9

Information Security Risk Assessment — A Practical Approach with a Mathematical Formulation of Risk

Information Security Risk Assessment — A Practical Approach with a Mathematical Formulation of Risk

... protect information such as company assets against data loss, disclosure or alteration to ensure continuity of business ...web-based Information Security Risk Management Tool to achieve theses ...

7

INTERACTING THROUGH DISCLOSING: PEER INTERACTION PATTERNS BASED ON 
SELF DISCLOSURE LEVELS VIA FACEBOOK

INTERACTING THROUGH DISCLOSING: PEER INTERACTION PATTERNS BASED ON SELF DISCLOSURE LEVELS VIA FACEBOOK

... to information system development – business processes modeling and business project risk ...practice, risk is assessed at the later stages of project development (design and ...Traditionally, ...

11

A Risk Assessment Method Based on Business Analysis in Information Security

A Risk Assessment Method Based on Business Analysis in Information Security

... the information technology is influencing our life in all ...of information on the network is increasingly serious. Information security risk assessment is an effective way to ...

7

Taxonomy of Security Risk threats in information systems Risk Management

Taxonomy of Security Risk threats in information systems Risk Management

... to information security and their actions have attracted( Jourdanet et al ...to information security risk assessment, such as the central computing and telecommunications, ...

10

A Compartive Analysis on Risk Assessment Information Security Models

A Compartive Analysis on Risk Assessment Information Security Models

... their information security ...each information security risk assessment models and also analyze which ones address information security risk ...resulting ...

7

Risk assessment model for organizational information security

Risk assessment model for organizational information security

... Information security risk assessment (RA) plays an important role in the organization’s future strategic ...the risk that use numerical ...assessing information security ...

7

Changing Requirements of Information Security landscape

Changing Requirements of Information Security landscape

... ABSTRACT:Information security risk assessment has gained importance as organisations‟ dependence on information has grown on the one handwhile the threat environment has become complex on the ...

8

Bayesian Belief Network, Bayesian Learning, Information Security, Intelligent Agent, Risk Assessment.

Bayesian Belief Network, Bayesian Learning, Information Security, Intelligent Agent, Risk Assessment.

... an information security risk management to evaluate asset's values and related ...The risk management is usually a human activity which includes risk assessment, strategy ...

5

A Data-driven Assessment Model for Information Systems Security Risk Management

A Data-driven Assessment Model for Information Systems Security Risk Management

... fuzzy risk analysis ...ambiguous information by simulating the characteristic of human in making judgments, it is unable to provide the graphical relationships among various security risk ...

7

Information Security Policies and their Relationship with the Effectiveness of the Management Information Systems of Major Palestinian Universities in the Gaza Strip

Information Security Policies and their Relationship with the Effectiveness of the Management Information Systems of Major Palestinian Universities in the Gaza Strip

... the information quality and confidentiality (Doherty & Fulford, ...Periodical Risk Assessment, ISP creation, Implementation, Revision and Development, reflect strongly and positively upon MIS ...

26

Information security risk management in a public institution: a case study

Information security risk management in a public institution: a case study

... regarding security organization and infrastructure (D1) displays a considerable neutral range, while the remaining ones differs specially about the roles played by people as well as responsibilities while some ...

7

Development of Metamodel on Information Security Risk Audit and Assessment for IT Assets in Commercial Bank

Development of Metamodel on Information Security Risk Audit and Assessment for IT Assets in Commercial Bank

... According to Quaziet knowledge, layout of next systems to recognize the complex structures and minimize the complexity through decomposing each of them accordingly into smaller pieces and models are supporting the ...

10

Security Risk Assessment of LoRaWan

Security Risk Assessment of LoRaWan

... Most experts believe that LoRaWan devices have privacy concerns. One of the threat actors are nation states. Over the last year, on multiple occasions we have learnt that governments are interested in collecting data ...

68

Video calls from lay bystanders to dispatch centers   risk assessment of information security

Video calls from lay bystanders to dispatch centers risk assessment of information security

... Risk assessment was performed by a group, led by a risk assessment expert ...of risk assessment including three group meet- ings, we found that a better understanding of the ...

7

FEATURE ANALYSIS OF PUBLIC COMPLAINT HANDLING APPLICATION USING FODA

FEATURE ANALYSIS OF PUBLIC COMPLAINT HANDLING APPLICATION USING FODA

... total information security risk and a cost of a corresponding ...effectiveness assessment model for information security investments rests upon a comparison of the net present ...

11

A Grey Model for Evaluation of Information Systems Security

A Grey Model for Evaluation of Information Systems Security

... risk management methodology. In order to verify the validity of proposed model, we select a number of information systems (IS) to carry out risk assessment. Using this method to classification ...

8

An Information center Risk Assessment for Information Security

An Information center Risk Assessment for Information Security

... sensitive information may flow from one domain to another domain if it is ...asset-center risk assessment is not enough because the procedure of information's flow is dynamic rather than ...the ...

5

Show all 10000 documents...

Related subjects