Security risk analysis and evaluation

@article{Harmantzis2004SecurityRA,
  title={Security risk analysis and evaluation},
  author={Fotios C. Harmantzis and Manu Malek},
  journal={2004 IEEE International Conference on Communications (IEEE Cat. No.04CH37577)},
  year={2004},
  volume={4},
  pages={1897-1901 Vol.4}
}
Security and cyber-terrorism have become increasingly important issues for organizations and the society. We propose a risk management framework from a bottom-up perspective, i.e. modeling the different types of attacks (or risk types) that an organization could experience. A quantitative model is presented to measure the economic impact of security risk. In addition to risk management, a further goal of this research is to apply data mining techniques to predict and prevent security attacks in… CONTINUE READING

From This Paper

Figures, tables, and topics from this paper.

Citations

Publications citing this paper.

References

Publications referenced by this paper.
Showing 1-10 of 12 references

2002 CSI/FBI Computer Crime and Security Survey

  • CSI
  • http://www.gocsi.com/.
Highly Influential
12 Excerpts

Methodologies for managing and measuring operational risk

  • F. C. Harmantzis
  • Annual INFORMS Meeting 2002, San Jose, CA.
  • 2002
2 Excerpts

Probability and Random Processes

  • G. Grimmett, D. Stirzaker
  • Oxford University Press, 2001.
  • 2001
2 Excerpts

Risk Management

  • M. Crouhy, R. Mark, D. Galai
  • McGraw-Hill, 2000.
  • 2000
1 Excerpt

Computer attacks: what they are and how to defend against them

  • NIST ITL Bulletin
  • May 1999.
  • 1999
1 Excerpt

Modeling Extremal Events

  • P. Embrechts, C. Klupperberg, T. Mikosch
  • Springer, 1997.
  • 1997
1 Excerpt

Similar Papers

Loading similar papers…