Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,815,125 papers from all fields of science
Search
Sign In
Create Free Account
Information Technology Security Assessment
Known as:
IT security assessment
, IT security risk assessment
, Information technology security risk assessment
Information Technology Security Assessment (IT Security Assessment) is an explicit study to locate IT security vulnerabilities and risks.
Wikipedia
(opens in a new tab)
Create Alert
Alert
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
How to design a method for measuring IT security in micro enterprises for IT security level measuring? A literature analysis
M. Heidenreich
Karlsruhe Institute of Technology - Proceedings
2017
Corpus ID: 25862939
The author focuses on the issue of IT security for micro enterprises, specifically enterprises carrying out manual work…
Expand
2017
2017
Towards efficient practical side-channel cryptanalysis
Timo Bartkewitz
2017
Corpus ID: 37034441
Diese Arbeit beschaftigt sich mit der Effizienz der Seitenkanal-Kryptanalyse. In Teil II dieser Arbeit demonstrieren wir, wie die…
Expand
2016
2016
Why 2 times 2 ain't necessarily 4 - at least not in IT security risk assessment
J. Braband
arXiv.org
2016
Corpus ID: 12089297
Recently, a novel approach towards semi-quantitative IT security risk assessment has been proposed in the draft IEC 62443-3-2…
Expand
2011
2011
An agile IT security model for project risk assessment
D. Hutchinson
,
H. Maddern
,
Jason G. Wells
Australian Information Security Management…
2011
Corpus ID: 60537188
There are two fundamental challenges in effectively performing security risk assessment in today's IT projects.The first is the…
Expand
2010
2010
Towards Validating Risk Indicators Based on Measurement Theory
Ayse Morali
,
R. Wieringa
2010
Corpus ID: 33240415
Due to the lack of quantitative information and for cost-efficiency purpose, most risk assessment methods use partially ordered…
Expand
2008
2008
Improvement and Scenario-Based Evaluation of the eXtended Method for Assessment of System Security
Thomas Sundmark
2008
Corpus ID: 60325580
This master’s thesis consists of a scenario-based evaluation of an IT-security assessment method known as the eXtendedMethod for…
Expand
2007
2007
Rationale for and Capabilities of IT Security Assessment
N. Hallberg
,
J. Hallberg
,
A. Hunstad
IEEE SMC Information Assurance and Security…
2007
Corpus ID: 1220741
The abundance of security threats makes IT security a prerequisite for the use of information technology (IT). Striving for…
Expand
2003
2003
Consideration of Privacy Issues in Risk Assessments and Policies
2003
Corpus ID: 264758042
A video recorder for automatically recording information being broadcast on at least one predetermined channel at a predetermined…
Expand
Review
2002
Review
2002
Technical issues in securing e-government
N. Boudriga
IEEE International Conference on Systems, Man and…
2002
Corpus ID: 39579038
Deploying e-governments ervices and opening the private network of agencies for e-business, generates a number of new security…
Expand
2000
2000
Federal Information Technology Security Assessment Framework | NIST
E. Roback
2000
Corpus ID: 168852924
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required