Resolving Vulnerability Identification Errors using Security Requirements on Business Process Models

  • Published 2013
Purpose In any information security risk assessment, vulnerabilities are usually identified by information-gathering techniques. However, vulnerability identification errors wrongly identified or unidentified vulnerabilities can occur as uncertain data are used. Furthermore, businesses’ security needs are not considered sufficiently. Hence, security… CONTINUE READING