Elsevier

Computers & Security

Volume 9, Issue 4, June 1990, Pages 339-346
Computers & Security

Computer security methodology: Risk analysis and project definition

https://doi.org/10.1016/0167-4048(90)90104-2Get rights and content

Abstract

A structured, progressive approach to the process of risk analysis, problem identification and project definition will contribute to the successful implementation of computer security in an organization. Potential losses of information technology assets need to be identified and quantified. It is critical for the senior management of an organization to be involved in the decision making process regarding the selection of computer security countermeasures. The objectives of this paper are to address the issue of risk analysis in view of an overall information security plan.

References (18)

There are more references available in the full text version of this article.

Cited by (12)

  • Stochastic comparisons for rooted butterfly networks and tree networks, with random environments

    2011, Information Sciences
    Citation Excerpt :

    Stochastic orderings have been used as instruments both to compare and to bound the waiting times and other random amounts arising from queueing networks (see e.g., [1,11,26,28,30,31,40,41,43]). In addition, stochastic orderings have been applied in computer networks (see e.g., [8,2]). Several probabilistic bounds can be obtained from stochastic comparisons by comparing with some threshold random variables.

  • Designing a Risk Assessment Tool for Artificial Intelligence Systems

    2021, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
View all citing articles on Scopus
1

received a B.S.c. (computer science) degree at the University of Stellenbosch, South Africa, in 1980. In 1989 she received a Masters degree at the Rand Afrikaans University, Johannesburg, South Africa, and she is currently working towards a Ph.D. degree in computer science at the same university. She has worked as a technical support analyst at major Prime installations. While working for her Masters degree she applied her research by working as a consultant in the field of computer security.

2

received a B.S.c. (computer science) degree at the Rand Afrikaans University, Johannesburg, South Africa in 1978. In 1980 he received an M.Sc. degree in computer science at the same university, his dissertation involved an in-depth study of all the logical aspects of computer security. Part of this research was published in Computers & Security (November 1983) under the title “Selection Process for Security Packages”. In 1985 he received a Ph.D. (computer science) degree with a thesis titled “The Development of a Specification Language for a Computer Security System”. Part of the research done for his Ph.D. degree was published in Computers & Security under the same title. He also delivered papers at IFIP/SEC'84 and IFIP/ SEC'84. He gained practical experience by working as a computer consultant as well as manager of a large information centre. He is currently a professor in computer science at the Rand Afrikaans University, South Africa.

View full text