An Attempt to Structure Risk Assessment
Paper in proceedings, 2012

We propose a security Risk Assessment process model which details the steps in the Risk Assessment process, such as resources used for Risk Assessment, actions performed on these resources, input data gained by these actions, risk evaluation methods applied and finally the output produced. The model highlights different paths that can be taken in RA methods, some issues with the existing methods and potential areas for development of new methods.

Risk Analysis

Risk Quantification and Qualification

Risk Assessment process model

Information System Security Risk Assessment

Author

Laleh Pirzadeh Irannezhad

Chalmers, Computer Science and Engineering (Chalmers)

Nordsec 2012, The 17th Conference on Secure IT Systems

Areas of Advance

Information and Communication Technology

Subject Categories

Computer and Information Science

Computer Science

DOI

10.1007/978-3-642-34210-3

ISBN

978-3-642-34210-3

More information

Created

10/8/2017