CFP last date
20 May 2024
Reseach Article

A Compartive Analysis on Risk Assessment Information Security Models

by K. V. D. Kiran, L. S. S. Reddy, N. Lakshmi Haritha
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 82 - Number 9
Year of Publication: 2013
Authors: K. V. D. Kiran, L. S. S. Reddy, N. Lakshmi Haritha
10.5120/14148-2314

K. V. D. Kiran, L. S. S. Reddy, N. Lakshmi Haritha . A Compartive Analysis on Risk Assessment Information Security Models. International Journal of Computer Applications. 82, 9 ( November 2013), 41-47. DOI=10.5120/14148-2314

@article{ 10.5120/14148-2314,
author = { K. V. D. Kiran, L. S. S. Reddy, N. Lakshmi Haritha },
title = { A Compartive Analysis on Risk Assessment Information Security Models },
journal = { International Journal of Computer Applications },
issue_date = { November 2013 },
volume = { 82 },
number = { 9 },
month = { November },
year = { 2013 },
issn = { 0975-8887 },
pages = { 41-47 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume82/number9/14148-2314/ },
doi = { 10.5120/14148-2314 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:57:20.946172+05:30
%A K. V. D. Kiran
%A L. S. S. Reddy
%A N. Lakshmi Haritha
%T A Compartive Analysis on Risk Assessment Information Security Models
%J International Journal of Computer Applications
%@ 0975-8887
%V 82
%N 9
%P 41-47
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This study equates a choice of methods that allow an organization to weigh their information security risk. The initial models went through two selection iterations before we end up with the final three Risks assessment models. The main purpose of the study is to compare and clarify the different activities, inputs and outputs required by each information security risk assessment models and also analyze which ones address information security risk effectively. The resulting information helps evaluating the models' applicability to an organization and their specific needs. In order to verify and validate the conclusions taken from the theoretical study of the three final models, a practical experience was put into practice in a real organization.

References
  1. K. V. D. Kiran "A Novel Risk Analysis and Mitigation methods in Distributed banking system ",International Journal of Advances in Engineering & Technology , Vol 6,No 4,2012 pp:1593-1602.
  2. Sun, L. . , Srivastava, R. , Mock, T. : An Information systems Security Risk Assessment Model under Dempster-Shafer Theory of Belief Functions. Journal of Management Information Systems, Vol. 22, No. 4, Spring 2006: 109-142 (2006)
  3. Alberts, C. : Common Elements of Risk. Technical Note CMU/SEI-2006-TN-014, Carnegie Mellon University (April 2006)
  4. SPRINT: Risk Analysis For Information Systems, User Guide, Version 1. 0. The European Security Forum (1997)
  5. Bayne, J. : An Overview of Treath and Risk Assessment. SANS Institute, as part of the Information Security Reading Room (2002)
  6. A Risk Management Standard. AIRMIC, ALARM, IRM, London (2002)
  7. Jeremy Hilton,Pete Burnap and Anas Tawileh: Methods for the identification of Emerging and Future Risk, ENISA (2007)
  8. Inventory of risk assessment and risk management methods. ENISA ad hoc working group on risk assessment and risk management (2006)
  9. Alberts, C. and Dorofee, A. 2001. An Introduction to the OCTAVE Method. Software Engineering Institute, Carnegie Mellon University, USA.
Index Terms

Computer Science
Information Sciences

Keywords

Risk Assessment Models Information Security Risk