Title
An efficient security data-driven approach for implementing risk assessment
Abstract
Information security implementation in an organization regardless of its business processes will not be effective. Current approaches to risk assessment have moved towards business process-oriented ones. Thus, in new approaches, assets are got attention based on the business processes involved. But existing approaches that are based on business processes have their drawbacks. For example, we need to detail processes to know what security data is produced or used in tasks, and what are their importance from the organization’s point of view. Security data certainly has different meanings. How security data moves in an organization’s network environment is another important point. Therefore, the main task in information security would be protecting security data, from the point of creation location to storage.
Year
DOI
Venue
2020
10.1016/j.jisa.2020.102593
Journal of Information Security and Applications
Keywords
DocType
Volume
Risk assessment,Business process,Security data,Vulnerability,Threat,CVSS,OWASP,Security concerns,Security requirement
Journal
54
ISSN
Citations 
PageRank 
2214-2126
1
0.38
References 
Authors
0
1
Name
Order
Citations
PageRank
Alireza Shameli Sendi1638.08