To see the other types of publications on this topic, follow the link: Security Risk Analysis.

Journal articles on the topic 'Security Risk Analysis'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Security Risk Analysis.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Anton, Nicolae, and Anişor Nedelcu. "Security risk analysis and management." MATEC Web of Conferences 178 (2018): 08015. http://dx.doi.org/10.1051/matecconf/201817808015.

Full text
Abstract:
The management system of informational security is a part of the management system of an organization, that approaches the management of risk from the point of view of the involved information, approach that is used in order to set, to implement, to function, to monitor, to revise, to maintain and to improve the informational security at the organizational level, referring to the progress of the processes required by the management of risk in order to guarantee the security of the information. The appreciation of the efficiency of the security system represents a difficult problem and it conta
APA, Harvard, Vancouver, ISO, and other styles
2

Gerber, Mariana, and Rossouw von Solms. "From Risk Analysis to Security Requirements." Computers & Security 20, no. 7 (2001): 577–84. http://dx.doi.org/10.1016/s0167-4048(01)00706-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Karabacak, Bilge, and Ibrahim Sogukpinar. "ISRAM: information security risk analysis method." Computers & Security 24, no. 2 (2005): 147–59. http://dx.doi.org/10.1016/j.cose.2004.07.004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Gil, César, David Rios Insua, and Jesus Rios. "Adversarial Risk Analysis for Urban Security Resource Allocation." Risk Analysis 36, no. 4 (2016): 727–41. http://dx.doi.org/10.1111/risa.12580.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kuzminykh, Ievgeniia, Bogdan Ghita, Volodymyr Sokolov, and Taimur Bakhshi. "Information Security Risk Assessment." Encyclopedia 1, no. 3 (2021): 602–17. http://dx.doi.org/10.3390/encyclopedia1030050.

Full text
Abstract:
Information security risk assessment is an important part of enterprises’ management practices that helps to identify, quantify, and prioritize risks against criteria for risk acceptance and objectives relevant to the organization. Risk management refers to a process that consists of identification, management, and elimination or reduction of the likelihood of events that can negatively affect the resources of the information system to reduce security risks that potentially have the ability to affect the information system, subject to an acceptable cost of protection means that contain a risk
APA, Harvard, Vancouver, ISO, and other styles
6

Liwång, Hans, Jonas W. Ringsberg, and Martin Norsell. "Quantitative risk analysis – Ship security analysis for effective risk control options." Safety Science 58 (October 2013): 98–112. http://dx.doi.org/10.1016/j.ssci.2013.04.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kozhedub, Yuliia. "Analysis of cyber security risk management documents." Collection "Information technology and security" 5, no. 1 (2017): 82–95. http://dx.doi.org/10.20535/2411-1031.2017.5.1.120580.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Schultz, Eugene. "Internet security: Risk analysis, strategies, and firewalls." Network Security 1997, no. 7 (1997): 15. http://dx.doi.org/10.1016/s1353-4858(97)89883-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Yadav, Dharmendra, Anjali R. Mahajan, and A. Thomas. "Security risk analysis approach for smart grid." International Journal of Smart Grid and Green Communications 1, no. 3 (2018): 206. http://dx.doi.org/10.1504/ijsggc.2018.091349.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Yadav, Dharmendra, Anjali R. Mahajan, and A. Thomas. "Security risk analysis approach for smart grid." International Journal of Smart Grid and Green Communications 1, no. 3 (2018): 206. http://dx.doi.org/10.1504/ijsggc.2018.10012425.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Lemley, J. R., Vasilis M. Fthenakis, and Paul D. Moskowitz. "Security risk analysis for chemical process facilities." Process Safety Progress 22, no. 3 (2003): 153–62. http://dx.doi.org/10.1002/prs.680220304.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Petersen, Karen Lund. "Risk analysis – A field within security studies?" European Journal of International Relations 18, no. 4 (2011): 693–717. http://dx.doi.org/10.1177/1354066111409770.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Altiok, Tayfur. "Port security/safety, risk analysis, and modeling." Annals of Operations Research 187, no. 1 (2011): 1–3. http://dx.doi.org/10.1007/s10479-011-0849-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

An, Peng, and Sheng-hong Li. "Empirical analysis on risk of security investment." Applied Mathematics-A Journal of Chinese Universities 24, no. 2 (2009): 127–34. http://dx.doi.org/10.1007/s11766-009-1831-y.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Zahoruyko, L. V., T. A. Martʹyanova, and A. V. Skyrda. "Models of information technology security risk analysis." Optoelectronic information-power technologies 40, no. 2 (2021): 16–20. http://dx.doi.org/10.31649/1681-7893-2020-40-2-16-20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Jiang, Yixin, Yunan Zhang, Aidong Xu, et al. "Security Risk Analysis of Grid Edge Computing." IOP Conference Series: Earth and Environmental Science 693, no. 1 (2021): 012034. http://dx.doi.org/10.1088/1755-1315/693/1/012034.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Butun, Ismail, Nuno Pereira, and Mikael Gidlund. "Security Risk Analysis of LoRaWAN and Future Directions." Future Internet 11, no. 1 (2018): 3. http://dx.doi.org/10.3390/fi11010003.

Full text
Abstract:
LoRa (along with its upper layers definition—LoRaWAN) is one of the most promising Low Power Wide Area Network (LPWAN) technologies for implementing Internet of Things (IoT)-based applications. Although being a popular technology, several works in the literature have revealed vulnerabilities and risks regarding the security of LoRaWAN v1.0 (the official 1st specification draft). The LoRa-Alliance has built upon these findings and introduced several improvements in the security and architecture of LoRa. The result of these efforts resulted in LoRaWAN v1.1, released on 11 October 2017. This work
APA, Harvard, Vancouver, ISO, and other styles
18

Cohen, Fred. "Managing network security — Part 5: Risk management or risk analysis." Network Security 1997, no. 4 (1997): 15–19. http://dx.doi.org/10.1016/s1353-4858(97)80008-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Frydman, Maxime, Guifré Ruiz, Elisa Heymann, Eduardo César, and Barton P. Miller. "Automating Risk Analysis of Software Design Models." Scientific World Journal 2014 (2014): 1–12. http://dx.doi.org/10.1155/2014/805856.

Full text
Abstract:
The growth of the internet and networked systems has exposed software to an increased amount of security threats. One of the responses from software developers to these threats is the introduction of security activities in the software development lifecycle. This paper describes an approach to reduce the need for costly human expertise to perform risk analysis in software, which is common in secure development methodologies, by automating threat modeling. Reducing the dependency on security experts aims at reducing the cost of secure development by allowing non-security-aware developers to app
APA, Harvard, Vancouver, ISO, and other styles
20

Jabari, Samah, Isam Shahrour, and Jamal khatabi. "Use of Risk Analysis for Water Security Assessment." MATEC Web of Conferences 295 (2019): 02008. http://dx.doi.org/10.1051/matecconf/201929502008.

Full text
Abstract:
This paper presents analysis of water security using risk analysis. It contributes to an enhanced understanding of the water security issue through creating indicators and their use in the determination of the water security level. The paper presents first the methodology followed in this research, which includes three steps: identification of water risk drivers, the determination of their severity and likelihood and finally the calculation of the water security score. The paper presents the first step of the application of this methodology to Palestinian territory through the identification o
APA, Harvard, Vancouver, ISO, and other styles
21

Hu, Liang, and Yun Gen Hu. "Information Security Risk Assessment Analysis of Quantitative Methods." Applied Mechanics and Materials 687-691 (November 2014): 2015–18. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.2015.

Full text
Abstract:
The development of information technology is increasingly widespread application of information systems and social dependence on information systems is constantly increasing. Therefore, information security has become an important aspect of the development of information technology has an important impact on economic development and social security. Effective information security risk assessment is an important measure to improve information technology.
APA, Harvard, Vancouver, ISO, and other styles
22

Malik, Vinita, and Sukhdip Singh. "Security risk management in IoT environment." Journal of Discrete Mathematical Sciences and Cryptography 22, no. 4 (2019): 697–709. http://dx.doi.org/10.1080/09720529.2019.1642628.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Liu, Chang, Fang Wang, and Chang Li Sun. "Information Security Risk and Security Requirement Analysis Based on Interaction Power Mode." Advanced Materials Research 926-930 (May 2014): 1962–65. http://dx.doi.org/10.4028/www.scientific.net/amr.926-930.1962.

Full text
Abstract:
The interaction of electricity is one of the basic characteristics of smart grid, for interactive methods of using electricity and the information security risk and demand research. First of all, from the risk perspective, the interaction of electric power information security and wide area environment using power mode under the comparison qualitative, focuses on the differences in the objective conditions. The two in the threat generated subjective motive and the consequences of the accident etc.. On this basis, combined with the characteristics of the interaction system with electric busines
APA, Harvard, Vancouver, ISO, and other styles
24

Petrescu, Anca Gabriela. "Management Approach of Risk Analysis in Information Security." International Journal of Innovation in the Digital Economy 9, no. 3 (2018): 13–26. http://dx.doi.org/10.4018/ijide.2018070102.

Full text
Abstract:
This article describes how the ease of access to information and communication technologies is practically a prerequisite for the functioning of modern society. Taking the competitive market into consideration, the protection of the information infrastructure for a company, could mean that company has a competitive advantage. This article is relevant to better understand how the actors involved in information and communication technologies could develop new models of information systems and risk management strategies. The results of this research show that each manager must handle threats, bec
APA, Harvard, Vancouver, ISO, and other styles
25

Anosov, Roman, Sergey Anosov та Igor Shakhalov. "Сonceptual Model of Information Technology Security Risk Analysis". Voprosy kiberbezopasnosti, № 2(36) (2020): 2–10. http://dx.doi.org/10.21681/2311-3456-2020-2-02-10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Urdenko, Olexandr. "Systematic analysis of risk management information security measures." Modeling and Information Systems in Economics, no. 98 (November 28, 2019): 182–97. http://dx.doi.org/10.33111/mise.98.18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Zhang, Qiujin, Rong Jiang, Tong Li, Zifei Ma, Ming Yang, and Juan Yang. "Cloud Computing Privacy Security Risk Analysis and Evaluation." Recent Patents on Computer Science 11, no. 1 (2018): 32–43. http://dx.doi.org/10.2174/2213275911666180719121041.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Lamiri, Abdenaby, Kamal Gueraoui, and Gamal Zeggwagh. "Risk Analysis of Bitcoin Security Using Ebios Method." International Review of Civil Engineering (IRECE) 9, no. 2 (2018): 63. http://dx.doi.org/10.15866/irece.v9i2.13330.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Pasquinucci, Andrea. "Security, risk analysis and governance: a practical approach." Computer Fraud & Security 2007, no. 7 (2007): 12–14. http://dx.doi.org/10.1016/s1361-3723(07)70091-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Chollet, P. "Optimizing transport security risk analysis/emergency response preparedness." Packaging, Transport, Storage & Security of Radioactive Material 20, no. 3 (2009): 108–10. http://dx.doi.org/10.1179/174651009x449802.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Rezvani, Mohsen, Verica Sekulic, Aleksandar Ignjatovic, Elisa Bertino, and Sanjay Jha. "Interdependent Security Risk Analysis of Hosts and Flows." IEEE Transactions on Information Forensics and Security 10, no. 11 (2015): 2325–39. http://dx.doi.org/10.1109/tifs.2015.2455414.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Badenhorst, K. P., and Jan H. P. Eloff. "Computer security methodology: Risk analysis and project definition." Computers & Security 9, no. 4 (1990): 339–46. http://dx.doi.org/10.1016/0167-4048(90)90104-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Sommestad, Teodor, Mathias Ekstedt, and Pontus Johnson. "A probabilistic relational model for security risk analysis." Computers & Security 29, no. 6 (2010): 659–79. http://dx.doi.org/10.1016/j.cose.2010.02.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

ter Beek, Maurice H., Axel Legay, Alberto Lluch Lafuente, and Andrea Vandin. "Quantitative Security Risk Modeling and Analysis with RisQFLan." Computers & Security 109 (October 2021): 102381. http://dx.doi.org/10.1016/j.cose.2021.102381.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Wei, June, Binshan Lin, and Meiga Loho-Noya. "Development of an E-Healthcare Information Security Risk Assessment Method." Journal of Database Management 24, no. 1 (2013): 36–57. http://dx.doi.org/10.4018/jdm.2013010103.

Full text
Abstract:
This paper developed a method to assess information security risks in e-healthcare. Specifically, it first developed a static E-Healthcare Information Security Risk (EHISR) model to present thirty-three security risk factors by identifying information security threats and their sources in e-healthcare. Second, a dynamic E-Healthcare Information Flow (EHIF) model was developed to logically link these information risk factors in the EHISR model. Pattern analysis showed that information security risks could be classified into two levels, and versatility analysis showed that the overall security r
APA, Harvard, Vancouver, ISO, and other styles
36

Guarro, Sergio B. "Risk analysis and risk management models for information systems security applications." Reliability Engineering & System Safety 25, no. 2 (1989): 109–30. http://dx.doi.org/10.1016/0951-8320(89)90027-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Wang, Li Hui. "The Analysis of Enterprise Network Security Problems." Applied Mechanics and Materials 602-605 (August 2014): 3351–54. http://dx.doi.org/10.4028/www.scientific.net/amm.602-605.3351.

Full text
Abstract:
This paper analyses the security risks of the internal and external enterprise computer network, points out that the internal internet security of enterprise should focus on prevention which includes a variety of network security technology and the establishment of logging and review system. This paper also discusses the main technology of external internet security prevention such as firewall technology and encryption technology and so on and provides some suggestions about risk management and network security for some small and medium enterprises.
APA, Harvard, Vancouver, ISO, and other styles
38

Pyrgies, John. "The UAVs threat to airport security: risk analysis and mitigation." Journal of Airline and Airport Management 9, no. 2 (2019): 63. http://dx.doi.org/10.3926/jairm.127.

Full text
Abstract:
Purpose: This research studies the UAV incidents in the vicinity of worldwide airports in order to deliver a quantitative and qualitative analysis of this phaenomenon, to analyse the risks associated to this threat and propose mitigation measures that brings this risk to an ‘acceptable’ level.Methodology: A population of 139 ‘serious UAV incidents in the vicinity of worldwide airports’ has been constituted on the basis of the FAA and NASA databases and articles published on the Web by online media. This phaenomenon has then been analysed quantitatively using descriptive statistics techniques a
APA, Harvard, Vancouver, ISO, and other styles
39

Jiang, Qing Chao. "Analysis on Wireless LAN Security Issues and Security Implementation." Advanced Materials Research 1030-1032 (September 2014): 1657–59. http://dx.doi.org/10.4028/www.scientific.net/amr.1030-1032.1657.

Full text
Abstract:
With the global population of informatization and digitization, network technology is playing a very important role in people's lives. The role of wireless LAN applications is especially significant. People's daily lives and work are no longer confined to paper or wired connection, but gradually extend to the use of radio. Although it brought a lot of convenience to people's lives, wireless LAN security problems also frequently occurred. This paper mainly aims to analyze the security risk and at the same time offer some preventive measures.
APA, Harvard, Vancouver, ISO, and other styles
40

Kriaa, Siwar, Marc Bouissou, and Youssef Laarouchi. "A new safety and security risk analysis framework for industrial control systems." Proceedings of the Institution of Mechanical Engineers, Part O: Journal of Risk and Reliability 233, no. 2 (2018): 151–74. http://dx.doi.org/10.1177/1748006x18765885.

Full text
Abstract:
The migration of modern industrial control systems toward information and communication technologies exposes them to cyber-attacks that can alter the way they function, thereby causing adverse consequences on the system and its environment. It has consequently become crucial to consider security risks in traditional safety risk analyses for industrial systems controlled by modern industrial control system. We propose in this article a new framework for safety and security joint risk analysis for industrial control systems. S-cube (for supervisory control and data acquisition safety and securit
APA, Harvard, Vancouver, ISO, and other styles
41

Kusrini, Elisa, and Kholida Hanim. "Analysis of Compliance and Supply Chain Security Risks Based on ISO 28001 in a Logistic Service Provider in Indonesia." International Journal of Safety and Security Engineering 11, no. 2 (2021): 135–42. http://dx.doi.org/10.18280/ijsse.110202.

Full text
Abstract:
Risk of goods and security incidents, such as theft, boycott, smuggling and terrorism are likely to occur in a shipping process, therefore risk controls are needed to reduce the adverse effects. A research on the supply chain security risk management based on ISO 28001 security supply chain is conducted to overcome such problems. The purpose of this research is to analyse compliance & supply chain security risks and propose a mitigation based on ISO 28001 in a logistic service provider in Indonesia. A gap analysis is conducted to assess the compliance of security performance in seven areas
APA, Harvard, Vancouver, ISO, and other styles
42

Luo, Feng, Shuo Hou, Xuan Zhang, Zhenyu Yang, and Wenwen Pan. "Security Risk Analysis Approach for Safety-Critical Systems of Connected Vehicles." Electronics 9, no. 8 (2020): 1242. http://dx.doi.org/10.3390/electronics9081242.

Full text
Abstract:
Modern vehicles are no longer merely mechanical systems but are monitored and controlled by various electronic systems. Safety-critical systems of connected vehicles become vulnerable to cyberattacks because of increasing interconnection. At present, the security risk analysis of connected vehicles is mainly based on qualitative methods, while these methods are usually subjective and lack consideration for functional safety. In order to solve this problem, we propose in this paper a security risk analysis framework for connected vehicles based on formal methods. Firstly, we introduce the elect
APA, Harvard, Vancouver, ISO, and other styles
43

Lozito, Ken. "Mitigating Risk." International Journal of Business Intelligence Research 2, no. 2 (2011): 67–75. http://dx.doi.org/10.4018/jbir.2011040105.

Full text
Abstract:
Business Intelligence (BI) has often been described as the tools and systems that play an essential role in the strategic planning process of a corporation. The application of BI is most commonly associated with the analysis of sales and stock trends, pricing and customer behavior to inform business decision-making. There is a growing trend in utilizing the tools and processes used in the analysis of data and applying them to security event management. Security Information and Event Management (SIEM) has emerged within the last 10 years providing a centralized source to enable both real-time a
APA, Harvard, Vancouver, ISO, and other styles
44

Filippov, D. L. "Components of physical security risk." Issues of Risk Analysis 16, no. 4 (2019): 82–93. http://dx.doi.org/10.32686/1812-5220-2019-16-4-82-93.

Full text
Abstract:
The article considers the existing methods of risk analysis in the design of physical protection systems. It is noted that in the expert method vulnerability assessed integrally, that does not guarantee the principle of equal strength, vulnerability elements of physical protection are considered without regard to the vulnerability of the object itself, and parameters of the model of the intruder, not taking into account such factors as catalysts and inhibitors of the threat. Noted that to improve the adequacy of physical protection required the formation of a databank of security threats and v
APA, Harvard, Vancouver, ISO, and other styles
45

Meriah, Ines, and Latifa Ben Arfa Rabai. "Analysing Information Security Risk Ontologies." International Journal of Systems and Software Security and Protection 11, no. 1 (2020): 1–16. http://dx.doi.org/10.4018/ijsssp.2020010101.

Full text
Abstract:
This research work presents existing security ontologies and identifies relevant security ontology requirements in information systems. Moreover, it proposes a new classification of security ontologies in which, two main families, namely ontologies-based security standards and ontologies-based security risk assessment, are defined. For each family, a set of related research works is selected and a thorough description of their security ontologies is presented. The purpose of this analysis is to identify security ontology requirements as well as ontological characteristics for each study in ord
APA, Harvard, Vancouver, ISO, and other styles
46

Warren, MJ. "A Risk Analysis Model to Reduce Computer Security Risks Among Healthcare Organizations." Risk Management 3, no. 1 (2001): 27–37. http://dx.doi.org/10.1057/palgrave.rm.8240074.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Kaluarachchilage, Pubudu Kalpani Hitigala, Chris P. Tsokos, and Sasith M. Rajasooriya. "Nonhomogeneous Risk Rank Analysis Method for Security Network System." International Journal of Communications, Network and System Sciences 12, no. 01 (2019): 1–10. http://dx.doi.org/10.4236/ijcns.2019.121001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

YANG, Xiao-ming. "Analysis of risk evaluation techniques on information system security." Journal of Computer Applications 28, no. 8 (2008): 1920–23. http://dx.doi.org/10.3724/sp.j.1087.2008.01920.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

V.D.Kiran, K., L. S. S. Reddy, and N. Lakshmi Haritha. "A Compartive Analysis on Risk Assessment Information Security Models." International Journal of Computer Applications 82, no. 9 (2013): 41–47. http://dx.doi.org/10.5120/14148-2314.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Wu, Cheng-Kuang, and Chongfu Huang. "Using Trust Game for Cross-Strait Security Risk Analysis." Journal of Risk Analysis and Crisis Response 8, no. 2 (2018): 75. http://dx.doi.org/10.2991/jrarc.2018.8.2.3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!