Security risk vector for quantitative asset assessment

Yoon Jung Chung, InJung Kim, NamHoon Lee, Taek Lee, Hoh In

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

There are standard risk analysis methodologies like GMITS and ISO17799, but new threats and vulnerabilities appear day by day because the IT organizations, its infrastructure, and its environment are changing. Accordingly, the methodologies must evolve in step with the change. Risk analysis methods are generally composed of asset identification, vulnerability analysis, safeguard identification, risk mitigation, and safeguard implementation. As the first process, the asset identification is important because the target scope of risk analysis is defined. This paper proposes a new approach, security risk vector, for evaluating assets quantitatively. A case study is presented.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science
EditorsO. Gervasi, M.L. Gavrilova, V. Kumar, A. Lagana, H.P. Lee, Y. Mun, D. Taniar, C.J.K. Tan
Pages274-283
Number of pages10
Volume3481
EditionII
Publication statusPublished - 2005
EventInternational Conference on Computational Science and Its Applications - ICCSA 2005 - , Singapore
Duration: 2005 May 92005 May 12

Other

OtherInternational Conference on Computational Science and Its Applications - ICCSA 2005
CountrySingapore
Period05/5/905/5/12

Fingerprint

Risk analysis

ASJC Scopus subject areas

  • Computer Science (miscellaneous)

Cite this

Chung, Y. J., Kim, I., Lee, N., Lee, T., & In, H. (2005). Security risk vector for quantitative asset assessment. In O. Gervasi, M. L. Gavrilova, V. Kumar, A. Lagana, H. P. Lee, Y. Mun, D. Taniar, ... C. J. K. Tan (Eds.), Lecture Notes in Computer Science (II ed., Vol. 3481, pp. 274-283)

Security risk vector for quantitative asset assessment. / Chung, Yoon Jung; Kim, InJung; Lee, NamHoon; Lee, Taek; In, Hoh.

Lecture Notes in Computer Science. ed. / O. Gervasi; M.L. Gavrilova; V. Kumar; A. Lagana; H.P. Lee; Y. Mun; D. Taniar; C.J.K. Tan. Vol. 3481 II. ed. 2005. p. 274-283.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Chung, YJ, Kim, I, Lee, N, Lee, T & In, H 2005, Security risk vector for quantitative asset assessment. in O Gervasi, ML Gavrilova, V Kumar, A Lagana, HP Lee, Y Mun, D Taniar & CJK Tan (eds), Lecture Notes in Computer Science. II edn, vol. 3481, pp. 274-283, International Conference on Computational Science and Its Applications - ICCSA 2005, Singapore, 05/5/9.
Chung YJ, Kim I, Lee N, Lee T, In H. Security risk vector for quantitative asset assessment. In Gervasi O, Gavrilova ML, Kumar V, Lagana A, Lee HP, Mun Y, Taniar D, Tan CJK, editors, Lecture Notes in Computer Science. II ed. Vol. 3481. 2005. p. 274-283
Chung, Yoon Jung ; Kim, InJung ; Lee, NamHoon ; Lee, Taek ; In, Hoh. / Security risk vector for quantitative asset assessment. Lecture Notes in Computer Science. editor / O. Gervasi ; M.L. Gavrilova ; V. Kumar ; A. Lagana ; H.P. Lee ; Y. Mun ; D. Taniar ; C.J.K. Tan. Vol. 3481 II. ed. 2005. pp. 274-283
@inproceedings{d102498bafa64bc8bfc0713df6c8a665,
title = "Security risk vector for quantitative asset assessment",
abstract = "There are standard risk analysis methodologies like GMITS and ISO17799, but new threats and vulnerabilities appear day by day because the IT organizations, its infrastructure, and its environment are changing. Accordingly, the methodologies must evolve in step with the change. Risk analysis methods are generally composed of asset identification, vulnerability analysis, safeguard identification, risk mitigation, and safeguard implementation. As the first process, the asset identification is important because the target scope of risk analysis is defined. This paper proposes a new approach, security risk vector, for evaluating assets quantitatively. A case study is presented.",
author = "Chung, {Yoon Jung} and InJung Kim and NamHoon Lee and Taek Lee and Hoh In",
year = "2005",
language = "English",
volume = "3481",
pages = "274--283",
editor = "O. Gervasi and M.L. Gavrilova and V. Kumar and A. Lagana and H.P. Lee and Y. Mun and D. Taniar and C.J.K. Tan",
booktitle = "Lecture Notes in Computer Science",
edition = "II",

}

TY - GEN

T1 - Security risk vector for quantitative asset assessment

AU - Chung, Yoon Jung

AU - Kim, InJung

AU - Lee, NamHoon

AU - Lee, Taek

AU - In, Hoh

PY - 2005

Y1 - 2005

N2 - There are standard risk analysis methodologies like GMITS and ISO17799, but new threats and vulnerabilities appear day by day because the IT organizations, its infrastructure, and its environment are changing. Accordingly, the methodologies must evolve in step with the change. Risk analysis methods are generally composed of asset identification, vulnerability analysis, safeguard identification, risk mitigation, and safeguard implementation. As the first process, the asset identification is important because the target scope of risk analysis is defined. This paper proposes a new approach, security risk vector, for evaluating assets quantitatively. A case study is presented.

AB - There are standard risk analysis methodologies like GMITS and ISO17799, but new threats and vulnerabilities appear day by day because the IT organizations, its infrastructure, and its environment are changing. Accordingly, the methodologies must evolve in step with the change. Risk analysis methods are generally composed of asset identification, vulnerability analysis, safeguard identification, risk mitigation, and safeguard implementation. As the first process, the asset identification is important because the target scope of risk analysis is defined. This paper proposes a new approach, security risk vector, for evaluating assets quantitatively. A case study is presented.

UR - http://www.scopus.com/inward/record.url?scp=24944463399&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=24944463399&partnerID=8YFLogxK

M3 - Conference contribution

VL - 3481

SP - 274

EP - 283

BT - Lecture Notes in Computer Science

A2 - Gervasi, O.

A2 - Gavrilova, M.L.

A2 - Kumar, V.

A2 - Lagana, A.

A2 - Lee, H.P.

A2 - Mun, Y.

A2 - Taniar, D.

A2 - Tan, C.J.K.

ER -