Please use this identifier to cite or link to this item:
https://hdl.handle.net/20.500.14365/3573
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kondakçı, Süleyman | - |
dc.date.accessioned | 2023-06-16T15:00:49Z | - |
dc.date.available | 2023-06-16T15:00:49Z | - |
dc.date.issued | 2010 | - |
dc.identifier.isbn | 9.78142E+12 | - |
dc.identifier.uri | https://doi.org/10.1109/ISIAS.2010.5604039 | - |
dc.identifier.uri | https://hdl.handle.net/20.500.14365/3573 | - |
dc.description | 2010 6th International Conference on Information Assurance and Security, IAS 2010 -- 23 August 2010 through 25 August 2010 -- Atlanta, GA -- 82434 | en_US |
dc.description.abstract | This paper presents a probabilistic approach to encode causal relationships among various threat sources and victim systems in order to facilitate quantitative and relational security assessment of information systems. In addition to providing a simple risk analysis approach compared to qualitative methods, it is unique in that it makes no a priori assumptions regarding the test domain. Therefore, it applies equally well to a variety of information systems, software development projects, IT products, and other decision making systems. The entire framework proposes a unique concept to analyse dependence and causality within a network of interdependent assets. Security risk management is mostly considered by security certification authorities, test and evaluation facilities, and some organizations such as CC, CCITT, and ISACA. In order to invent new methods that can facilitate security management, we need to consider risk assessment as a major research topic for evaluation facilities. © 2010 IEEE. | en_US |
dc.language.iso | en | en_US |
dc.relation.ispartof | 2010 6th International Conference on Information Assurance and Security, IAS 2010 | en_US |
dc.rights | info:eu-repo/semantics/closedAccess | en_US |
dc.subject | Risk modeling | en_US |
dc.subject | Security analysis | en_US |
dc.subject | Test methods and tools | en_US |
dc.subject | Uncertainty inference | en_US |
dc.subject | Analysis approach | en_US |
dc.subject | Causal model | en_US |
dc.subject | Causal relationships | en_US |
dc.subject | Decision-making systems | en_US |
dc.subject | Information security risk assessment | en_US |
dc.subject | IT products | en_US |
dc.subject | Probabilistic approaches | en_US |
dc.subject | Qualitative method | en_US |
dc.subject | Research topics | en_US |
dc.subject | Risk modeling | en_US |
dc.subject | Security analysis | en_US |
dc.subject | Security assessment | en_US |
dc.subject | Security certification | en_US |
dc.subject | Security management | en_US |
dc.subject | Software development projects | en_US |
dc.subject | Test and evaluation | en_US |
dc.subject | Test method | en_US |
dc.subject | Uncertainty inference | en_US |
dc.subject | Information systems | en_US |
dc.subject | Quality control | en_US |
dc.subject | Risk analysis | en_US |
dc.subject | Risk assessment | en_US |
dc.subject | Risk management | en_US |
dc.subject | Risk perception | en_US |
dc.subject | Security systems | en_US |
dc.subject | Software design | en_US |
dc.subject | Uncertainty analysis | en_US |
dc.subject | Security of data | en_US |
dc.title | A causal model for information security risk assessment | en_US |
dc.type | Conference Object | en_US |
dc.identifier.doi | 10.1109/ISIAS.2010.5604039 | - |
dc.identifier.scopus | 2-s2.0-78349282314 | en_US |
dc.authorscopusid | 15061511300 | - |
dc.identifier.startpage | 143 | en_US |
dc.identifier.endpage | 148 | en_US |
dc.relation.publicationcategory | Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı | en_US |
dc.identifier.scopusquality | N/A | - |
dc.identifier.wosquality | N/A | - |
item.grantfulltext | reserved | - |
item.openairetype | Conference Object | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.fulltext | With Fulltext | - |
item.languageiso639-1 | en | - |
item.cerifentitytype | Publications | - |
crisitem.author.dept | 05.05. Computer Engineering | - |
Appears in Collections: | Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection |
Files in This Item:
File | Size | Format | |
---|---|---|---|
2665.pdf Restricted Access | 394.4 kB | Adobe PDF | View/Open Request a copy |
CORE Recommender
SCOPUSTM
Citations
13
checked on Nov 20, 2024
Page view(s)
64
checked on Nov 18, 2024
Download(s)
6
checked on Nov 18, 2024
Google ScholarTM
Check
Altmetric
Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.