Corpus ID: 16353595

Analysing Information Systems Security

  title={Analysing Information Systems Security},
  author={A. Svensson},
The paper describes problems with managing information systems security, due to its complexity and broad scope. Then, a security taxonomy is presented and discussed. The taxonomy is used in conjunction with different approaches to information security analysis, including the evaluation of different cost-benefit criteria. The paper also uses the terms proactive and reactive analysis as a way of differentiating between analysis methods. Moreover, the paper presents concepts from other research… Expand

Figures from this paper

Is There a Cost to Privacy Breaches? An Event Study
It is shown that there exists a negative and statistically significant impact of data breaches on a company’s market value on the announcement day for the breach, and the cumulative effect increases in magnitudes over the day following the breach announcement, but then decreases and loses statistical significance. Expand
A methodology for estimating the value of privacy in information disclosure systems
A methodology called VOPE (Value of Privacy Estimator) is proposed, which relies on behavioral economics' Prospect Theory and valuates people's privacy preferences in information disclosure scenarios and is based on an iterative and responsive methodology. Expand


A Structured Approach to Computer Security
Security and dependability are two closely connected areas. Recently, some attempts have been made to integrate the two concepts by integrating security into the more general topic of dependability.Expand
A DSS for information security analysis: computer support in a company's risk management
  • T. Finne
  • Computer Science
  • 1996 IEEE International Conference on Systems, Man and Cybernetics. Information Intelligence and Systems (Cat. No.96CH35929)
  • 1996
This paper will show how the author has created a DSS for analysing information security, and treat the key principles of risk management. Expand
Multivariate data analysis software for enhancing system security
This article presents a multivariate data analysis technique that is a nice mathematical tool for the analysis of user behavior patterns in intrusion detection and presents a system that records all user activities in each login session and identifies abnormal sessions when the monitoring data are analyzed. Expand
Notice of Violation of IEEE Publication PrinciplesWhich models should be applied to measure computer security and information assurance?
  • L. Reznik
  • Computer Science
  • The 12th IEEE International Conference on Fuzzy Systems, 2003. FUZZ '03.
  • 2003
It is concluded that neither of methodologies being applied for measurement of computer security and/or reliability may be considered as comprehensive and good. Expand
Utilising fuzzy logic and trend analysis for effective intrusion detection
This paper will propose a proactive and dynamic approach, based on trend analysis and fuzzy logic that could be utilized to minimize and control intrusion in an organization's computer system. Expand
Network Security Essentials: Applications and Standards
This book is intended as a one-semester undergraduate course on network security for computer science, computer engineering, and electrical engineering majors, and serves as a basic reference volume and is suitable for self-study. Expand
Security in computing
This book describes the security pitfalls inherent in many important computing tasks today and points out where existing controls are inadequate and serious consideration must be given to the risk present in the computing situation. Expand
HACCP: a total quality system for assuring food safety and quality
  • J. K. Mcanelly
  • Business
  • Proceedings of Annual Reliability and Maintainability Symposium (RAMS)
  • 1994
Food processors are being challenged to increase product safety while improving quality and productivity. These objectives can be achieved using total quality management (TQM) and hazard analysisExpand
Hazard Analysis and Critical Control Point Principles and Application Guidelines †.
The HACCP Subcommittee of the National Advisory Committee on Microbiological Criteria for Foods (NACMCF) has prepared a revision of the document "Hazard Analysis and Critical Control Point System"Expand
Inside Internet Security — What Hackers Don’t Want You To Know
Crume argues that hackers are predators exploiting their vulnerabilities but that the authors can put their threat into perspective and construct realistic defences and disseminate what hackers don’t want us to know. Expand