Pregled bibliografske jedinice broj: 1176860
Use of Probabilistic Risk Assessment Methodology for Providers of Services in a Virtual Environment
Use of Probabilistic Risk Assessment Methodology for Providers of Services in a Virtual Environment // Sustainable Management of Manufacturing Systems in Industry 4.0 / Knapčíková, Lucia ; Peraković, Dragan ; Periša, Marko ; Balog, Michal (ur.).
Cham: Springer, 2022. str. 129-142 doi:10.1007/978-3-030-90462-3_9
CROSBI ID: 1176860 Za ispravke kontaktirajte CROSBI podršku putem web obrasca
Naslov
Use of Probabilistic Risk Assessment Methodology for
Providers of Services in a Virtual Environment
Autori
Zorić, Petra ; Musa, Mario ; Kuljanić, Tibor Mijo
Vrsta, podvrsta i kategorija rada
Poglavlja u knjigama, znanstveni
Knjiga
Sustainable Management of Manufacturing Systems in Industry 4.0
Urednik/ci
Knapčíková, Lucia ; Peraković, Dragan ; Periša, Marko ; Balog, Michal
Izdavač
Springer
Grad
Cham
Godina
2022
Raspon stranica
129-142
ISBN
978-3-030-90462-3
ISSN
2522-8595
Ključne riječi
Information Systems ; Event Tree Analysis ; Fault Tree Analysis ; Service Availability ; Security Threats ; Security Risk
Sažetak
Information and data in today’s world are the most valuable assets of an organization. Every business system is exposed to certain risks and threats. One of the critical parameters that affect an organization’s exposure to risk is information security. Its goal is to protect information from threats. The information security risk management system establishes a mechanism for controlling and managing an organization’s acceptable risk level. Selecting an appropriate risk assessment methodology allows the organization’s managers to prioritize risks according to their severity or other criteria. Given the complexity of today’s information business, the Probabilistic Risk Assessment methodology has begun to be applied in information security risk assessment. By creating a use case scenario, it is possible to conduct qualitative and quantitative risk assessments. As part of the above methodology, event trees and fault trees are used to indicate possible scenarios, find the causes of their occurrence, and model the possible failure of controls applicable to risk mitigation. This chapter will present one of the use cases of information security risk assessment using these trees. Also, it will show the application of these trees in a complex information system’s conditions on the example of an organization in the Republic of Croatia.
Izvorni jezik
Engleski
Znanstvena područja
Tehnologija prometa i transport
POVEZANOST RADA
Ustanove:
Fakultet prometnih znanosti, Zagreb
Citiraj ovu publikaciju:
Časopis indeksira:
- Scopus