An investigation of security risk & taxonomy of Cloud Computing environment

A Sharma, UK Singh, K Upreti… - 2021 2nd International …, 2021 - ieeexplore.ieee.org
… Before deploying cloud computing-based applications, a security risk assessment in terms
of vulnerabilities must be … The investigation of the security risk in terms of vulnerabilities are: …

Taxonomy of information security risk assessment (ISRA)

A Shameli-Sendi, R Aghababaei-Barzegar… - … & security, 2016 - Elsevier
security problems in the corporate world is through a risk-based approach. In this paper, we
present a taxonomy of security risk … in selecting suitable risk assessment methods that satisfy …

[PDF][PDF] An investigation study for risk calculation of security vulnerabilities on android applications (in

RM Abdullah, AZ Abualkishik, NM Isaacc… - Indonesian Journal of …, 2022 - academia.edu
security risk if roles could obtain permission to unauthorized medical information. To reduce
security risk a new hybrid risk … The risk assessment metric is calculated using risk ranking …

[HTML][HTML] An investigation of mitigating the safety and security risks allied with oil and gas pipeline projects

L Kraidi, R Shah, W Matipa, F Borthwick - Journal of Pipeline Science and …, 2021 - Elsevier
… Oil and Gas Pipeline (OGP) projects face a wide range of safety and security Risk Factors
(… to mitigate the risk in OGP projects. This paper presents a prototype of the risk management …

An integrated cyber security risk management approach for a cyber-physical system

HI Kure, S Islam, MA Razzaque - Applied Sciences, 2018 - mdpi.com
… cyber-security risk management framework that considers all phases of the risk management
… We follow an empirical investigation through a case study and action research to determine …

[图书][B] The security risk assessment handbook: A complete guide for performing security risk assessments

D Landoll - 2021 - taylorfrancis.com
… There are four stages of the information security risk management process: security risk … of
information security risk is determined during the security risk assessment. Information security

Investigation on security risk of LoRaWAN: Compatibility scenarios

S Loukil, LC Fourati, A Nayyar, C So-In - IEEE Access, 2022 - ieeexplore.ieee.org
… In this paper, we analyze the LoRaWAN architectures and then discuss the basic security
After that, we investigate and identify the potential security risks and network vulnerabilities …

[PDF][PDF] An empirical investigation of security vulnerabilities within web applications.

I Abunadi, M Alenezi - J. Univers. Comput. Sci., 2016 - malenezi.github.io
… significant aid to the security engineers who focus their attention on higher risk components.
The security of most systems and networks depends on the security of the software running …

[PDF][PDF] The Evolution of Information Security Strategies: A Comprehensive Investigation of INFOSEC Risk Assessment in the Contemporary Information Era

A Al Hayajneh, HN Thakur… - Computer and …, 2023 - pdfs.semanticscholar.org
investigation highlights the notable importance of risk assessment in the wider scope of
information security… additional investigation and improvement in the field of risk assessment. One …

Network Security Risk Investigation System Based on Internet of Things Technology

Q He - 2021 6th International Conference on Smart Grid and …, 2021 - ieeexplore.ieee.org
… premise of reducing network security accidents not only requires users to fully use the network
security risk survey system, but also should establish a good network security awareness. …