A Comparative Study on Information Security Risk Analysis Methods

@article{Agrawal2017ACS,
  title={A Comparative Study on Information Security Risk Analysis Methods},
  author={V. Agrawal},
  journal={J. Comput.},
  year={2017},
  volume={12},
  pages={57-67}
}
  • V. Agrawal
  • Published 2017
  • Computer Science
  • J. Comput.
Background – Risk Analysis is an integral part of management practice and an essential element of good corporate governance. There are many risk analysis methods available today, and it is a tedious task for an organization (particularly small and mid-scale company) to choose the proper method. Problem – Although many methods and tools are available in this domain, very few inventories do exist that are structured according to a set of common properties. There are many risk analysis methods… Expand
A framework for estimating information security risk assessment method completeness
A Framework for Cloud Security Risk Management Based on the Business Objectives of Organizations
Applicability of risk analysis methods to risk-aware routing in software-defined networks
Dynamic Expert System-Based Geographically Adapted Malware Risk Evaluation Method
...
1
2
...

References

SHOWING 1-10 OF 20 REFERENCES
A Survey of Information Security Risk Analysis Methods
A comparative framework for risk analysis methods
A framework for comparing different information security risk analysis methodologies
ISRAM: information security risk analysis method
The IS risk analysis based on a business model
Model-based risk assessment to improve enterprise security
Model-based risk assessment – the CORAS approach
A classification scheme for risk assessment methods.
...
1
2
...