Information Technology Security Assessment

Known as: IT security assessment, IT security risk assessment, Information technology security risk assessment 
Information Technology Security Assessment (IT Security Assessment) is an explicit study to locate IT security vulnerabilities and risks.
Wikipedia

Topic mentions per year

Topic mentions per year

2005-2016
012320052016

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Some recent incidents have shown that possibly the vulnerability of IT systems in railway automation has been underestimated… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • table 2
Is this relevant?
2016
2016
Recently, a novel approach towards semi-quantitative IT security risk assessment has been proposed in the draft IEC 62443-3-2… (More)
  • figure 1
  • figure 2
Is this relevant?
2016
2016
Recently, a novel approach towards semi-quantitative IT security risk assessment has been proposed in the draft IEC 62443-3-2… (More)
  • figure 1
  • figure 2
Is this relevant?
2013
2013
This paper explores the idea that IT security risk assessment can be formalized as an argumentation game in which assessors argue… (More)
  • figure 1
  • figure 2
Is this relevant?
Review
2011
Review
2011
Traditional information technology (IT) security risk assessment approaches are based on an analysis of events, probabilities and… (More)
  • table 1
Is this relevant?
2008
2008
The information security strategic plan is necessarily comprehensive, including business processes, people, and physical… (More)
  • figure 1
  • table 1
Is this relevant?
2007
2007
The Glasgow Composite Measure Pain Scale (CMPS) for dogs suffering acute pain, developed using psychometric methodology, measures… (More)
  • table 1
  • table 2
  • figure 1
  • table 3
  • figure 2
Is this relevant?
2007
2007
The abundance of security threats makes IT security a prerequisite for the use of information technology (IT). Striving for… (More)
Is this relevant?
2005
2005
Security assessment is a central ability in the striving for adequate levels of IT security in information systems and networks… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?