Information Technology Reference
In-Depth Information
REFERENCES
Jacobson, R.V.: CORA. Cost of Risk Analysis. Painless Risk Management for Small
Systems, International Security Technology, Inc. (1996)
Owens, S.: Information Security Management: An Introduction, British Standards
Institution (1998)
Bilbao, A.: TUAR. A Model of Risk Analysis in the Security Field”, CH3119-5/92, IEEE
(1992)
Kailey, M. P., Jarratt, P.: RAMeX: A Prototype Expert System for Computer Security
Risk Analysis and Management, Computers & Security , Vol. 14 , No. 5 (1995) 449-463
Gordon, J.: Security Modelling, Risk Analysis Methods and Tools, IEE Colloquium on
(1992)
Spinellis, D., Kokolakis, S., Gritzalis, S.: Security Requirements, Risks and
Recommendations for Small Enterprise and Home Office Environments, Information
Management & Computer Security, 7/3 (1999) 121-128
Security Risk Analysis and Management, A White Paper by B. D. Jenkins,
Countermeasures, INC., 1998
COBRA Consultant Products For Windows, An easy to use guide and evaluation aid,
2000
Business Risk Analysis: Establishing a Risk Analysis Method which is easy to
understand and simple to apply. European Security Forum, from Coopers and Lybrand,
Europe
Toval, A., Nicolas, J., Moros, B., Garcia, F.: Requirements Reuse for Improving Systems
Security: A Practitioner's Approach, Requirements Engineering , 6 (2002) 205-219
United Kingdom Central Computer and Telecommunication Agency, CCTA Risk
Analysis and Management Method, CRAMM User Guide, Issue 1.0, 1996
Gerber, M., Solms R.: From Risk Analysis to Security Requirements, Computers &
Security , 20/8 (1999) 577-584
URN 76/702, The Business Manager's Guide to Information Security, Department of
Trade and Industry, 1996
Hoelzer, D.: SANS Audit Track, Auditing Principles and Concepts, Version 1.1a, 2002
www.sans.org
www.securityfocus.com
www.commoncriteria.org
www.cert.org
Search WWH ::




Custom Search