[图书][B] The security risk assessment handbook: A complete guide for performing security risk assessments

D Landoll - 2021 - taylorfrancis.com
… There are four stages of the information security risk management process: security risk … of
information security risk is determined during the security risk assessment. Information security

Assessing information security risks in the cloud: A case study of Australian local government authorities

O Ali, A Shrestha, A Chatfield, P Murray - Government Information Quarterly, 2020 - Elsevier
security and monitoring of cloud services. Security assessments are important mechanisms
for risk … participants in relation to the security questions under investigation. Data was then …

Cyber-physical energy systems security: Threat modeling, risk assessment, resources, metrics, and case studies

I Zografopoulos, J Ospina, X Liu, C Konstantinou - IEEE Access, 2021 - ieeexplore.ieee.org
… For each asset and every investigated potential attack, the risk analysis process needs to
be … The presented risk assessment approaches in this section are credible if security

… to use mobile banking applications in the UK older generation (55+). A mixed-method study using modified UTAUT and MTAM-with perceived cyber security, risk, and …

Y Hanif, HS Lallie - Technology in Society, 2021 - Elsevier
… This research proposes a model that can be used to assess cyber security user perception
surrounding cyber security risk, privacy, and trust of mobile banking applications by the UK 55…

Investigation into phishing risk behaviour among healthcare staff

PK Yeng, MA Fauzi, B Yang, P Nimbe - Information, 2022 - mdpi.com
security policy decreases with corresponding increases in their phishing security risk … SE
to positively correlate with phishing-related security behaviour. This could therefore mean that …

The internet of things security: A survey encompassing unexplored areas and new insights

AE Omolara, A Alabdulatif, OI Abiodun, M Alawida… - … & Security, 2022 - Elsevier
… continue to take advantage of IoT's security loopholes and vulnerabilities. The … risk to human
safety. Thus, a timely and comprehensive review, analysis and investigation of the security

Automation of Asset Inventory for Cyber Security: Investigation of Event Correlation-Based Technique

I Kotenko, E Doynikova, A Fedorchenko, V Desnitsky - Electronics, 2022 - mdpi.com
… Asset inventory is one of the essential steps in cyber security analysis and management.
It is required for security risk identification. Current information systems are large-scale, …

[PDF][PDF] Managing security risk: How COVID19 pandemic and work-from-home arrangements pose new security considerations

M O'Reardon, M Rendar - Employee Relations Law Journal, 2020 - pillsburylaw.com
… Allowing roommates, children, or partners to access your work devices creates its own
security risk. While you can likely trust your loved ones not to steal company secrets, children are …

IoT cyber risk: A holistic analysis of cyber risk assessment frameworks, risk vectors, and risk ranking process

K Kandasamy, S Srinivas, K Achuthan… - … on Information Security, 2020 - Springer
security risk. The Open-Web Application Security Project (OWASP) testing guide computes
risk … This work has the potential to trigger more investigations in the area of IoT and IoMT risks…

Exploration recommendations for the investigation of security incidents

R Brisse - 2024 - theses.hal.science
… Analysts specialized in such matters have responsibilities that include conducting security
audits to ensure compliance with regulations, assessing vulnerabilities, analysing risk factors, …