Abstract
A Hybrid Model for Information Security Risk Assessment
Highlights
The ever-changing cyber activities evolved in a manner that circumvents the confidentiality, integrity and availability of control boundaries that are built in technologies
The process of threat identification and analysis against information asset provide a direction for carrying out an accurate risk assessment and implement appropriate countermeasures to mitigate the risks on resources and information
The threat identification and analysis are expanded in threat modeling methodologies and frameworks which are designed to follow a technical process to risk assessment
Summary
The ever-changing cyber activities evolved in a manner that circumvents the confidentiality, integrity and availability of control boundaries that are built in technologies. The process of threat identification and analysis against information asset provide a direction for carrying out an accurate risk assessment and implement appropriate countermeasures to mitigate the risks on resources and information. The scope of the methodologies of threat analysis is expanded and discussed in detail as part of the process of application development life cycle using threat modeling techniques [4]. This capability does not extend to the ongoing risk management practices in order to identify, analyze and evaluate threats appropriately.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal of Advanced Trends in Computer Science and Engineering
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.