Journal of Information Security

Volume 2, Issue 2 (April 2011)

ISSN Print: 2153-1234   ISSN Online: 2153-1242

Google-based Impact Factor: 3.79  Citations  

Proposed Framework for Security Risk Assessment

HTML  Download Download as PDF (Size: 11098KB)  PP. 85-90  
DOI: 10.4236/jis.2011.22008    8,130 Downloads   19,673 Views  Citations

Affiliation(s)

.

ABSTRACT

Security risk assessment framework provides comprehensive structure for security risk analysis that would help uncover systems’ threats and vulnerabilities. While security risk assessment is an important step in the security risk management process, this paper will focus only on the security risk assessment framework. Viewing issues that exist in a current framework, we have developed a new framework for security risk and vulnerabilities assessment by adding new components to the processes of the existing framework. The proposed framework will further enhance the outcome of the risk assessment, and improve the effectiveness of the current framework. To demonstrate the efficiency the proposed framework, a network security simulation as well as filed tests of an existing network where conducted.

Share and Cite:

Z. Saleh, H. Refai and A. Mashhour, "Proposed Framework for Security Risk Assessment," Journal of Information Security, Vol. 2 No. 2, 2011, pp. 85-90. doi: 10.4236/jis.2011.22008.

Cited by

[1] Leveraging big data analytics in 5G‐enabled IoT and industrial IoT for the development of sustainable smart cities
Transactions on …, 2022
[2] 情報セキュリティインシデント抑制のための ISO/IEC 27001 規格の活用に関する研究
2021
[3] Importance of Timely and Efficient Data Collection Process in Security Risk Management
2021
[4] Managing Software Security Risks through an Integrated Computational Method
2021
[5] Managing Security-Risks for Improving Security-Durability of Institutional Web-Applications: Design Perspective
2021
[6] A Systematic Review: Vulnerability Assessment of Wi-Fi in Educational
2020
[7] Security Risk Analysis based on Data Criticality
2020
[8] A Systematic Review: Vulnerability Assessment of Wi-Fi in Educational Institution
2020
[9] Defining organisational information security culture—Perspectives from academia and industry
2020
[10] An Approach to Basic Requirements for Maintaining the Software Applications used in Nuclear Facilities
2020
[11] INFORMATION SECURITY RISK MANAGEMENT: A SYSTEMATIC LITERATURE REVIEW.
2019
[12] A New Method for Assets Sensitivity Calculation and Technical Risks Assessment in the Information Systems
2019
[13] New method for assets sensitivity calculation and technical risks assessment in the information systems
2019
[14] Information Structure Framework for ISMS Planning and Certification: Malaysian Data
2018
[15] System Simulation of a Bayesian Network-Based Performance Prediction Model for Data Communication Networks
2018
[16] MedDevRisk: Risk Analysis Methodology for Networked Medical Devices
2018
[17] The Cybersecurity Framework as an Effective Information Security Baseline: A Qualitative Exploration
2018
[18] Verification and Validation Techniques for Streaming Big Data Analytics in Internet ofThings Environment
2018
[19] Verification and validation techniques for streaming big data analytics in internet of things environment
2018
[20] ICT Risk Management Methodology Proposal for Governmental Entities Based on ISO/IEC 27005
2018
[21] Survey of Information Security Risk Management Models
International Journal of Business, Humanities and Technology, 2017
[22] Integrating relational data frameworks into risk assessment of networked medical devices
ProQuest Dissertations Publishing, 2017
[23] Examine the relationship between information technology governance, control objectives for information and related technologies, ISO 27001/27002, and risk …
ProQuest Dissertations Publishing, 2017
[24] Examine the relationship between information technology governance, control objectives for information and related technologies, ISO 27001/27002, and risk …
2017
[25] Implementation of cyber security for safety systems of nuclear facilities
Progress in Nuclear Energy, 2016
[26] Taxonomy of information security risk assessment (ISRA)
Computers & Security, 2016
[27] ICT Readiness for Business Continuity in local government
2016
[28] An Exploration of Wireless Networking and the Management of Associated Security Risk
Walden Dissertations and Doctoral Studies, 2015
[29] Using Application of Dezert-Smarandache Theory on a new framework for protecting MANET
2015
[30] Network cybersecurity indicators: Determining cybersecurity indicators that accurately reflect the state of cybersecurity of a network
ProQuest Dissertations Publishing, 2015
[31] Control priorization model for improving information security risk assessment
2014
[32] Research on the calculation method of information security risk assessment considering human reliability
Reliability, Maintainability and Safety (ICRMS), 2014 International Conference on, 2014
[33] An Adaptive Decision-Support Model for Data Communication Network Security Risk Management
International Journal of Computer Applications, 2014
[34] System lifecycle processes for cyber security in a research reactor facility
Science China Information Sciences, 2014
[35] Cultivating of Human's Behavior Toward Security Effectiveness in Health Information System
AB Shahri, Z Ismail, NZ Rahim, 2014
[36] A DEVELOPMENT FRAMEWORK FOR SOFTWARE SECURITY IN NUCLEAR SAFETY SYSTEMS: INTEGRATING SECURE DEVELOPMENT AND SYSTEM SECURITY ACTIVITIES
NUCLEAR ENGINEERING AND TECHNOLOGY, 2014
[37] CONTROL PRIORITIZATION MODEL FOR IMPROVING INFORMATION SECURITY RISK ASSESSMENT
2014
[38] Exploring information technology security requirements for academic institutions to reduce information security attacks, breaches, and threats
2014
[39] Electric power information system security risk assessment based on fuzzy rating multilevel analysis
Instrumentation and Measurement, Sensor Network and Automation (IMSNA), 2013 2nd International Symposium on. IEEE, 2013
[40] A graded approach to cyber security in a research reactor facility
Progress in Nuclear Energy, 2013
[41] Risk Assessment & Management in Merchant Capture Systems: A Threat Analysis Perspective
2013

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.