Abstract | ||
---|---|---|
Information security implementation in an organization regardless of its business processes will not be effective. Current approaches to risk assessment have moved towards business process-oriented ones. Thus, in new approaches, assets are got attention based on the business processes involved. But existing approaches that are based on business processes have their drawbacks. For example, we need to detail processes to know what security data is produced or used in tasks, and what are their importance from the organization’s point of view. Security data certainly has different meanings. How security data moves in an organization’s network environment is another important point. Therefore, the main task in information security would be protecting security data, from the point of creation location to storage. |
Year | DOI | Venue |
---|---|---|
2020 | 10.1016/j.jisa.2020.102593 | Journal of Information Security and Applications |
Keywords | DocType | Volume |
Risk assessment,Business process,Security data,Vulnerability,Threat,CVSS,OWASP,Security concerns,Security requirement | Journal | 54 |
ISSN | Citations | PageRank |
2214-2126 | 1 | 0.38 |
References | Authors | |
0 | 1 |
Name | Order | Citations | PageRank |
---|---|---|---|
Alireza Shameli Sendi | 1 | 63 | 8.08 |