A Practical Security Risk Analysis Process and Tool for Information System


YoonJung Chung, InJung Kim, DoHoon Lee, Journal of Information Processing Systems Vol. 2, No. 2, pp. 95-100, Jun. 2006  

https://doi.org/
Keywords: risk management, Asset, Threats, Vulnerability, Countermeasure
Fulltext:

Abstract

While conventional business administration-based information technology management methods are applied to the risk analysis of information systems, no security risk analysis techniques have been used in relation to information protection. In particular, given the rapid diffusion of information systems and the demand for information protection, it is vital to develop security risk analysis techniques. Therefore, this paper will suggest an ideal risk analysis process for information systems. To prove the usefulness of this security risk analysis process, this paper will show the results of managed, physical and technical security risk analysis that are derived from investigating and analyzing the conventional information protection items of an information system.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.




Cite this article
[APA Style]
Chung, Y., Kim, I., & Lee, D. (2006). A Practical Security Risk Analysis Process and Tool for Information System. Journal of Information Processing Systems, 2(2), 95-100. DOI: .

[IEEE Style]
Y. Chung, I. Kim, D. Lee, "A Practical Security Risk Analysis Process and Tool for Information System," Journal of Information Processing Systems, vol. 2, no. 2, pp. 95-100, 2006. DOI: .

[ACM Style]
YoonJung Chung, InJung Kim, and DoHoon Lee. 2006. A Practical Security Risk Analysis Process and Tool for Information System. Journal of Information Processing Systems, 2, 2, (2006), 95-100. DOI: .