Academic literature on the topic 'Security risk countermeasure'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security risk countermeasure.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Security risk countermeasure"
Fenz, Stefan, and Thomas Neubauer. "Ontology-based information security compliance determination and control selection on the example of ISO 27002." Information & Computer Security 26, no. 5 (November 12, 2018): 551–67. http://dx.doi.org/10.1108/ics-02-2018-0020.
Full textBaca, Dejan, and Kai Petersen. "Countermeasure graphs for software security risk assessment: An action research." Journal of Systems and Software 86, no. 9 (September 2013): 2411–28. http://dx.doi.org/10.1016/j.jss.2013.04.023.
Full textSato, Naoshi. "Proposal on Measure Against Cyberattack on the Basis of Recent Trend." Journal of Disaster Research 12, no. 5 (September 27, 2017): 1050–59. http://dx.doi.org/10.20965/jdr.2017.p1050.
Full textRowshan, Shahed, William C. Sauntry, Thomas M. Wood, Bruce Churchill, and Steve R. Levine. "Reducing Security Risk for Transportation Management Centers." Transportation Research Record: Journal of the Transportation Research Board 1938, no. 1 (January 2005): 17–24. http://dx.doi.org/10.1177/0361198105193800103.
Full textYazdinejad, Abbas, Behrouz Zolfaghari, Amin Azmoodeh, Ali Dehghantanha, Hadis Karimipour, Evan Fraser, Arthur G. Green, Conor Russell, and Emily Duncan. "A Review on Security of Smart Farming and Precision Agriculture: Security Aspects, Attacks, Threats and Countermeasures." Applied Sciences 11, no. 16 (August 16, 2021): 7518. http://dx.doi.org/10.3390/app11167518.
Full textShang, Jin Rui. "Lanshan Port Environmental Protection Countermeasure Research - Based on the Sustainable Development." Advanced Materials Research 726-731 (August 2013): 3961–67. http://dx.doi.org/10.4028/www.scientific.net/amr.726-731.3961.
Full textFenz, Stefan, Johannes Heurix, Thomas Neubauer, and Fabian Pechstein. "Current challenges in information security risk management." Information Management & Computer Security 22, no. 5 (November 10, 2014): 410–30. http://dx.doi.org/10.1108/imcs-07-2013-0053.
Full textAbimbola, Oni Omoyemi, Akinyemi Bodunde Odunola, Aladesanmi Adegboye Temitope, Ganiyu Adesola Aderounmu, and Kamagaté Beman Hamidja. "An Improved Stochastic Model for Cybersecurity Risk Assessment." Computer and Information Science 12, no. 4 (November 22, 2019): 96. http://dx.doi.org/10.5539/cis.v12n4p96.
Full textViduto, Valentina, Carsten Maple, Wei Huang, and David López-Peréz. "A novel risk assessment and optimisation model for a multi-objective network security countermeasure selection problem." Decision Support Systems 53, no. 3 (June 2012): 599–610. http://dx.doi.org/10.1016/j.dss.2012.04.001.
Full textShao, Weiwei, Jiahong Liu, Haixing Zhang, Dianyi Yan, and Weijia Li. "Countermeasure Analysis on Promoting Drinking Water Safety in Shanshan County, Xinjiang Autonomous Region, China." Water 10, no. 8 (August 2, 2018): 1022. http://dx.doi.org/10.3390/w10081022.
Full textDissertations / Theses on the topic "Security risk countermeasure"
Valičková, Monika. "Řízení bezpečnosti inteligentní domácnosti." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2018. http://www.nusl.cz/ntk/nusl-378362.
Full textDočekal, Petr. "Návrh zavedení bezpečnostních opatření v souladu s ISMS pro obchodní společnost." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2018. http://www.nusl.cz/ntk/nusl-378344.
Full textKalabis, Petr. "Management informační bezpečnosti v podniku." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2016. http://www.nusl.cz/ntk/nusl-241646.
Full textŠumbera, Adam. "Zavedení managementu bezpečnosti informací v podniku dle ISO 27001." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2013. http://www.nusl.cz/ntk/nusl-224217.
Full textKrídla, Matúš. "Návrh zavedení bezpečnostních opatření pro danou společnost." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2021. http://www.nusl.cz/ntk/nusl-444607.
Full textConnolly, Lena Y., and D. S. Wall. "The rise of crypto-ransomware in a changing cybercrime landscape: Taxonomising countermeasures." Elsevier, 2019. http://hdl.handle.net/10454/17916.
Full textYear in and year out the increasing adaptivity of offenders has maintained ransomware's position as a major cybersecurity threat. The cybersecurity industry has responded with a similar degree of adaptiveness, but has focussed more upon technical (science) than ‘non-technical’ (social science) factors. This article explores empirically how organisations and investigators have reacted to the shift in the ransomware landscape from scareware and locker attacks to the almost exclusive use of crypto-ransomware. We outline how, for various reasons, victims and investigators struggle to respond effectively to this form of threat. By drawing upon in-depth interviews with victims and law enforcement officers involved in twenty-six crypto-ransomware attacks between 2014 and 2018 and using an inductive content analysis method, we develop a data-driven taxonomy of crypto-ransomware countermeasures. The findings of the research indicate that responses to crypto-ransomware are made more complex by the nuanced relationship between the technical (malware which encrypts) and the human (social engineering which still instigates most infections) aspects of an attack. As a consequence, there is no simple technological ‘silver bullet’ that will wipe out the crypto-ransomware threat. Rather, a multi-layered approach is needed which consists of socio-technical measures, zealous front-line managers and active support from senior management.
This work was supported by the Engineering and Physical Sciences Research Council and is part of the EMPHASIS (EconoMical, PsycHologicAl and Societal Impact of RanSomware) project [EP/P011721/1].
Schuessler, Joseph H. "General Deterrence Theory: Assessing Information Systems Security Effectiveness in Large versus Small Businesses." Thesis, University of North Texas, 2009. https://digital.library.unt.edu/ark:/67531/metadc9829/.
Full textFältros, Jesper, Isak Alinger, and Bergen Axel von. "Safety risks with ZigBee smart devices : Identifying risks and countermeasures in ZigBee devices with an eavesdropping experiment." Thesis, Tekniska Högskolan, Jönköping University, JTH, Datateknik och informatik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-49630.
Full textKonečný, Martin. "GAP analýza systému řízení bezpečnosti informací." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2019. http://www.nusl.cz/ntk/nusl-399368.
Full textKameníček, Lukáš. "Návrh systém managementu ISMS." Master's thesis, Vysoké učení technické v Brně. Fakulta strojního inženýrství, 2011. http://www.nusl.cz/ntk/nusl-229425.
Full textBooks on the topic "Security risk countermeasure"
Thomas, Norman. Risk analysis and security countermeasure selection. Boca Raton, FL: CRC Press, 2010.
Find full textThomas, Norman. Risk analysis and security countermeasure selection. Boca Raton, FL: CRC Press, 2010.
Find full textNorman, Thomas. Risk analysis and security countermeasure selection. Boca Raton, FL: CRC Press, 2010.
Find full textNorman, Thomas L. Risk analysis and security countermeasure selection. Boca Raton: CRC Press, 2010.
Find full textGupta, Manish. Threats, countermeasures and advances in applied information security. Hershey, PA: Information Science Reference, 2012.
Find full textThreats, countermeasures and advances in applied information security. Hershey, PA: Information Science Reference, 2012.
Find full textArchitectural Engineering Institute. Building Rating Security Committee, ed. Building security rating system: Checklists to assess risks, consequences, and security countermeasures. Reston, Virginia: American Society of Civil Engineers, AEI, 2015.
Find full textC, Ragaini Richard, ed. International Seminar on Nuclear War and Planetary Emergencies, 29th session: Society and structures--culture and ideology, equity, territorial and economics, psychology, tools and countermeasures, worldwide stability, risk analysis for terrorism ... : "E. Majorana" Centre for Scientific Culture, Erice, Italy, 10-15 May 2003. Singapore: World Scientific, 2003.
Find full textLapham, Robert. Risk Analysis and Security Countermeasure Selection. CRC Press, 2015. http://dx.doi.org/10.1201/b18632.
Full textBook chapters on the topic "Security risk countermeasure"
Asnar, Yudistira, and Paolo Giorgini. "Modelling Risk and Identifying Countermeasure in Organizations." In Critical Information Infrastructures Security, 55–66. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11962977_5.
Full textHerrmann, Andrea, Ayse Morali, Sandro Etalle, and Roel Wieringa. "Risk and Business Goal Based Security Requirement and Countermeasure Prioritization." In Workshops on Business Informatics Research, 64–76. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29231-6_6.
Full textLabuschagne, L., and J. F. P. Eloff. "Activating dynamic countermeasures to reduce risk." In Information Systems Security, 187–96. Boston, MA: Springer US, 1996. http://dx.doi.org/10.1007/978-1-5041-2919-0_16.
Full textAffia, Abasi-amefon O., Raimundas Matulevičius, and Rando Tõnisson. "Security Risk Estimation and Management in Autonomous Driving Vehicles." In Lecture Notes in Business Information Processing, 11–19. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-79108-7_2.
Full textRjaibi, Neila, and Latifa Ben Arfa Rabai. "Monitoring the Effectiveness of Security Countermeasures in a Security Risk Management Model." In Software Engineering in Intelligent Systems, 327–37. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-18473-9_32.
Full text"Prioritizing Risk." In Risk Analysis and Security Countermeasure Selection, 193–202. CRC Press, 2009. http://dx.doi.org/10.1201/9781420078718-c11.
Full text"Prioritizing Risk." In Risk Analysis and Security Countermeasure Selection, 219–30. CRC Press, 2009. http://dx.doi.org/10.1201/9781420078718-15.
Full text"Security Policy Introduction." In Risk Analysis and Security Countermeasure Selection, 203–14. CRC Press, 2009. http://dx.doi.org/10.1201/9781420078718-c12.
Full text"Security Effectiveness Metrics." In Risk Analysis and Security Countermeasure Selection, 321–40. CRC Press, 2009. http://dx.doi.org/10.1201/9781420078718-c18.
Full text"Security Effectiveness Metrics." In Risk Analysis and Security Countermeasure Selection, 393–414. CRC Press, 2015. http://dx.doi.org/10.1201/b18632-26.
Full textConference papers on the topic "Security risk countermeasure"
Guohua, Zhu. "Enterprise Information Security Risk and Countermeasure Research under Network Environment." In 2015 Seventh International Conference on Measuring Technology and Mechatronics Automation (ICMTMA). IEEE, 2015. http://dx.doi.org/10.1109/icmtma.2015.115.
Full textEmejeamara, Uchechukwu, Udochukwu Nwoduh, and Andrew Madu. "Trusted Computing in Data Science: Viable Countermeasure in Risk Management Plan." In 8th International Conference of Security, Privacy and Trust Management (SPTM 2020). AIRCC Publishing Corporation, 2020. http://dx.doi.org/10.5121/csit.2020.100602.
Full textWaedt, Karl, Yongjian Ding, Antonio Ciriello, and Xinxin Lou. "Development, Distribution and Maintenance of Application Security Controls for Nuclear." In 2017 25th International Conference on Nuclear Engineering. American Society of Mechanical Engineers, 2017. http://dx.doi.org/10.1115/icone25-67499.
Full textRees, Daniel C., and Kenneth I. Rubin. "Managing and Protecting Infrastructure Assets." In ASME 2003 International Mechanical Engineering Congress and Exposition. ASMEDC, 2003. http://dx.doi.org/10.1115/imece2003-42612.
Full textBrown, Wayne J., Vince Anderson, and Qing Tan. "Multitenancy - Security Risks and Countermeasures." In 2012 15th International Conference on Network-Based Information Systems (NBiS). IEEE, 2012. http://dx.doi.org/10.1109/nbis.2012.142.
Full textGurban, Eugen Horatiu, Bogdan Groza, and Pal-Stefan Murvay. "Risk Assessment and Security Countermeasures for Vehicular Instrument Clusters." In 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W). IEEE, 2018. http://dx.doi.org/10.1109/dsn-w.2018.00068.
Full textKim, Ji-Hun, Woo-Seok Cho, Jong-Myeong Lee, Jin-O. Park, and Jae-Hee Lee. "Study on Security Risk and Its Countermeasures of O2O Service." In 2017 International Conference on Platform Technology and Service (PlatCon). IEEE, 2017. http://dx.doi.org/10.1109/platcon.2017.7883730.
Full textZou, Zhenwan, Tao Chen, Jia Chen, Yingsa Hou, and Ruxia Yang. "Research on Network Security Risk and Security Countermeasures of 5G Technology in Power System Application." In 2021 IEEE 5th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC). IEEE, 2021. http://dx.doi.org/10.1109/iaeac50856.2021.9390826.
Full textWang, Zezhou, Xiang Liu, Yongxin Wang, Chaitanya Yavvari, Matthew Jablonski, Duminda Wijesekera, Brian Sykes, and Keith Holt. "Cyber Security Analysis for Advanced Train Control System (ATCS) in CTC Systems: Concepts and Methods." In 2019 Joint Rail Conference. American Society of Mechanical Engineers, 2019. http://dx.doi.org/10.1115/jrc2019-1236.
Full textCilli, C. "An extensive approach to risk analysis for countermeasures definition." In European Conference on Security and Detection - ECOS97 Incorporating the One Day Symposium on Technology Used for Combatting Fraud. IEE, 1997. http://dx.doi.org/10.1049/cp:19970438.
Full text