A comparative study of risk assessment methods, MEHARI & CRAMM with a new formal model of risk assessment (FoMRA) in information systems

I El Fray - … Information Systems and Industrial Management: 11th …, 2012 - Springer
In this article, we present a comparative study of a developed new formal mathematical
model of risk assessment (FoMRA) with expert methods of risk assessment in the …

Modifications of the formal risk analysis and assessment for the information system security

IE Fray, A Wiliński - Advances in Science and Technology …, 2024 - yadda.icm.edu.pl
Modifications of the Formal Risk Analysis and Assessment for the Information System
Security Page 1 317 INTRODUCTION An analysis of the current state of knowledge shows …

A practical certificate and identity based encryption scheme and related security architecture

T Hyla, J Pejaś - IFIP International Conference on Computer Information …, 2013 - Springer
Group encryption schemes based on general access structures can be used to build
advanced IT systems, which store and manage confidential documents. The paper proposes …

A Mathematical Model for Risk Assessment of Social Engineering Attacks.

A Șandor, G Tont, E Simion - TEM Journal, 2022 - ceeol.com
Social engineering is a very common type of malicious activity conducted on cyberspace
that targets both individuals and companies in order to gain access to information or …

Using backward induction techniques in (timed) security protocols verification

M Kurkowski, O Siedlecka-Lamch, P Dudek - IFIP International Conference …, 2013 - Springer
This paper shows a new way of automatic verification of properties of untimed and timed
security protocols. To do this we use a modified version of previously introduced formal …

Оцінка ризиків кіберфізичних систем на базі мікроконтролерів

ІВ Ярощук - 2020 - elartu.tntu.edu.ua
Метою кваліфікаційної роботи є удосконалення технології оцінки ризиків інформаційної
безпеки КФС та розроблення рекомендацій щодо оцінки ризиків при прототипуванні …

[PDF][PDF] INFORMATION SYSTEM RISK CONTROL METHOD BASED ON OPERATION-FLOW

H Yang, X Cheng - scholar.archive.org
This paper proposes a risk control method based on operation-flow (ORCM) to effectively
control the risk of operation-flow in information systems. This method consists of the risk …

[PDF][PDF] OCENA BEZPIECZEŃSTWA SYSTEMÓW TELEINFORMATYCZNYCH PRZETWARZAJĄCYCH INFORMACJE NIEJAWNE

D Kacprowicz - bip.zut.edu.pl
Postęp w dziedzinie technologii teleinformatycznych spowodował, że większość
działalności organizacyjnych opiera się na przetwarzaniu informacji w systemach …

Nowe podejścia w zarządzaniu ryzykiem dla systemów informacyjnych organizacji

IE Fray, J Pejaś, T Hyla - Przegląd Elektrotechniczny, 2015 - yadda.icm.edu.pl
W artykule przedstawiono nowe podejście do zarządzania ryzykiem w systemach
informacyjnych zgodne z wymaganiami norm ISO/IEC. Proponowane podejście ma na celu …

[PDF][PDF] REDESIGNING RISK ANALYSIS. PRINCIPLES FOR A SYSTEMIC APPROACH

C ANUȚA - Bucharest–2016 - iksconference.ro
The traditional risk analysis methodologies are focused on assessing risks' impact and
likelihood based on threat agents' characteristics (eg intents or capabilities) and targets' …