Strategic Approaches in Network Communication and Information Security Risk Assessment
<p>Taxonomy of the related works and scope of information security risk management.</p> "> Figure 2
<p>ISO/IEC 27005 Information Security Risk Management [<a href="#B16-information-15-00353" class="html-bibr">16</a>].</p> "> Figure 3
<p>NIST Risk Assessment Activities.</p> "> Figure 4
<p>High-level structure of CRAMM.</p> ">
Abstract
:1. Introduction
2. Information Security Management
3. Risk Assessment
3.1. ISO/IEC 27005 Risk Management Standard
ISO/IEC 27005 Information Security Risk Assessment
3.2. NIST (SP-800-30)
3.3. Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE)
3.4. Information Risk Analysis Methodology (IRAM)
3.5. Expression of Needs and Identification of Security Objectives (EBIOS)
3.6. Cramm Method
3.7. Statistical Design of Expression Approach
3.8. Multi-Criteria Evaluation Methods
3.9. Cyber Investment Analysis Methodology (CIAM)
3.10. Enhanced Grey Risk Assessment Model Supporting Cloud Service Provider
3.11. A Situation Awareness Model for Information Security Risk Management
3.12. A Hybrid Model for Information Security Assessment
3.13. BWM-SWARA Approach
3.14. An Integrated Model to Enhance Security
3.15. AI-Powered Cyber Insurance Risk Assessment
4. Challenges in Control Assessment Methods
5. Future Directions
6. Conclusions
Author Contributions
Funding
Conflicts of Interest
References
- Alshahrani, H.M.; Alotaibi, S.S.; Ansari, M.T.J.; Asiri, M.M.; Agrawal, A.; Khan, R.A.; Mohsen, H.; Hilal, A.M. Analysis and Ranking of IT Risk Factors Using Fuzzy TOPSIS-Based Approach. Appl. Sci. 2022, 12, 5911. [Google Scholar] [CrossRef]
- Ghahramani, F.; Yazdanmehr, A.; Chen, D.; Wang, J. Continuous improvement of information security management: An organisational learning perspective. Eur. J. Inf. Syst. 2023, 32, 1011–1032. [Google Scholar] [CrossRef]
- Eachempati, P. Change Management in Information Asset. J. Glob. Inf. Manag. (JGIM) 2017, 25, 68–87. [Google Scholar] [CrossRef]
- Koltays, A.; Konev, A.; Shelupanov, A. Mathematical model for choosing counterparty when assessing information security risks. Risks 2021, 9, 133. [Google Scholar] [CrossRef]
- Shinde, P.S.; Ardhapurkar, S.B. Cyber security analysis using vulnerability assessment and penetration testing. In Proceedings of the 2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave), Coimbatore, India, 29 February–1 March 2016; pp. 1–5. [Google Scholar]
- Hubbard, D.W. The Failure of Risk Management: Why It’s Broken and How to Fix It; John Wiley & Sons: Hoboken, NJ, USA, 2020. [Google Scholar]
- Fenton, N.; Neil, M. Risk Assessment and Decision Analysis with Bayesian Networks; CRC Press: Boca Raton, FL, USA, 2018. [Google Scholar]
- Lu, L.; Goerlandt, F.; Banda, O.A.V.; Kujala, P. Developing fuzzy logic strength of evidence index and application in Bayesian networks for system risk management. Expert Syst. Appl. 2022, 192, 116374. [Google Scholar] [CrossRef]
- Akinrolabu, O.; New, S.; Martin, A. CSCCRA: A novel quantitative risk assessment model for SaaS cloud service providers. Computers 2019, 8, 66. [Google Scholar] [CrossRef]
- Hammarberg, R.; Gazzawi, A. Risk Management Challenges for SMEs: A Case Study; Springer: Berlin/Heidelberg, Germany, 2022. [Google Scholar]
- Jabar, T.; Singh, M.M. Exploration of Mobile Device Behavior for Mitigating Advanced Persistent Threats (APT): A Systematic Literature Review and Conceptual Framework. Sensors 2022, 22, 4662. [Google Scholar] [CrossRef] [PubMed]
- Wang, J. A Bayesian-Network-Based Framework for Risk Analysis and Decision Making in Cybersecurity. Ph.D. Thesis, Queen Mary University of London, London, UK, 2021. [Google Scholar]
- Llansó, T.; McNeil, M.; Noteboom, C. Multi-criteria selection of capability-based cybersecurity solutions. In Proceedings of the 52nd Hawaii International Conference on System Sciences, Maui, HI, USA, 8–11 January 2019. [Google Scholar]
- Nespoli, P.; Mármol, F.G.; Vidal, J.M. Battling against cyberattacks: Towards pre-standardization of countermeasures. Clust. Comput. 2021, 24, 57–81. [Google Scholar] [CrossRef]
- Bognár, F.; Benedek, P. A Novel Risk Assessment Methodology: A Case Study of the PRISM Methodology in a Compliance Management Sensitive Sector. Acta Polytech. Hung. 2021, 18, 89–108. [Google Scholar] [CrossRef]
- ISO/IEC 27005; Information Technology Security Techniques Information Security Risk Management. ISO: Geneva, Switzerland, 2008.
- Fahrurozi, M.; Tarigan, S.A.; Tanjung, M.A.; Mutijarsa, K. The Use of ISO/IEC 27005: 2018 for Strengthening Information Security Management (A Case Study at Data and Information Center of Ministry of Defence). In Proceedings of the 2020 12th International Conference on Information Technology and Electrical Engineering (ICITEE), Yogyakarta, Indonesia, 6–8 October 2020; pp. 86–91. [Google Scholar]
- Al-Sartawi, A.M.M. Information technology governance and cybersecurity at the board level. Int. J. Crit. Infrastruct. 2020, 16, 150–161. [Google Scholar] [CrossRef]
- Samimi, A. Risk Management in Information Technology. Prog. Chem. Biochem. Res. 2020, 3, 130–134. [Google Scholar] [CrossRef]
- Alberts, C.; Dorofee, A.; Stevens, J.; Woody, C. Introduction to the OCTAVE Approach; Carnegie-Mellon University Software Engineering Institute: Pittsburgh, PA, USA, 2003. [Google Scholar]
- Al-Safwani, N.; Fazea, Y.; Ibrahim, H. ISCP: In-depth model for selecting critical security controls. Comput. Secur. 2018, 77, 565–577. [Google Scholar] [CrossRef]
- Fischer, E.A. Creating a National Framework for Cybersecurity: An Analysis of Issues and Options; Library of Congress Washington Dc Congressional Research Service: Washington, DC, USA, 2005.
- Sun, L.; Srivastava, R.P.; Mock, T.J. An information systems security risk assessment model under the Dempster-Shafer theory of belief functions. J. Manag. Inf. Syst. 2006, 22, 109–142. [Google Scholar] [CrossRef]
- Feng, N.; Li, M. An information systems security risk assessment model under uncertain environment. Appl. Soft Comput. 2011, 11, 4332–4340. [Google Scholar] [CrossRef]
- Hong, K.S.; Chi, Y.P.; Chao, L.R.; Tang, J.H. An integrated system theory of information security management. Inf. Manag. Comput. Secur. 2003, 11, 243–248. [Google Scholar] [CrossRef]
- Sindhuja, P. The impact of information security initiatives on supply chain robustness and performance: An empirical study. Inf. Comput. Secur. 2021, 29, 365–391. [Google Scholar]
- Wheeler, E. Security Risk Management: Building an Information Security Risk Management Program from the Ground Up; Elsevier: Amsterdam, The Netherlands, 2011. [Google Scholar]
- Maček, D.; Magdalenić, I.; Begičević Ređep, N. A Model for the Evaluation of Critical IT Systems Using Multicriteria Decision-Making with Elements for Risk Assessment. Mathematics 2021, 9, 1045. [Google Scholar] [CrossRef]
- Furlani, C.M. Minimum Security Requirements for Federal Information and Information Systems; DIANE Publishing: Collingdale, PA, USA, 2009. [Google Scholar]
- Jean-Jules, J.; Vicente, R. Rethinking the implementation of enterprise risk management (ERM) as a socio-technical challenge. J. Risk Res. 2021, 24, 247–266. [Google Scholar] [CrossRef]
- Qiangmin, W.; Mengquan, L.; Jianhua, L. Method on network information system security assessment based on rough set. In Proceedings of the 2007 Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, Shanghai, China, 16–19 December 2007; pp. 1041–1046. [Google Scholar]
- Leszczyna, R. Review of Cybersecurity Assessment Methods: Applicability Perspective. Comput. Secur. 2021, 108, 102376. [Google Scholar] [CrossRef]
- Zhang, X.; Wuwong, N.; Li, H.; Zhang, X. Information security risk management framework for the cloud computing environments. In Proceedings of the 2010 10th IEEE International Conference on Computer and Information Technology, Bradford, UK, 29 June–1 July 2010; pp. 1328–1334. [Google Scholar]
- Faizi, A.; Padyab, A.; Naess, A. From rationale to lessons learned in the cloud information security risk assessment: A study of organizations in Sweden. Inf. Comput. Secur. 2022, 30, 190–205. [Google Scholar] [CrossRef]
- Merchan-Lima, J.; Astudillo-Salinas, F.; Tello-Oquendo, L.; Sanchez, F.; Lopez-Fonseca, G.; Quiroz, D. Information security management frameworks and strategies in higher education institutions: A systematic review. Ann. Telecommun. 2021, 76, 255–270. [Google Scholar] [CrossRef]
- Breier, J.; Hudec, L. Risk analysis supported by information security metrics. In Proceedings of the 12th International Conference on Computer Systems and Technologies, Vienna, Austria, 16–17 June 2011; pp. 393–398. [Google Scholar]
- Bhol, S.G.; Mohanty, J.; Pattnaik, P.K. Taxonomy of cyber security metrics to measure strength of cyber security. Mater. Today Proc. 2023, 80, 2274–2279. [Google Scholar] [CrossRef]
- Behnia, A.; Abd Rashid, R.; Chaudhry, J.A. A survey of information security risk analysis methods. SmartCR 2012, 2, 79–94. [Google Scholar] [CrossRef]
- Schmitz, C.; Pape, S. LiSRA: Lightweight security risk assessment for decision support in information security. Comput. Secur. 2020, 90, 101656. [Google Scholar] [CrossRef]
- Saleh, Z.I.; Refai, H.; Mashhour, A. Proposed Framework for Security Risk Assessment. J. Inf. Secur. 2011, 2, 85–90. [Google Scholar] [CrossRef]
- Shameli-Sendi, A.; Aghababaei-Barzegar, R.; Cheriet, M. Taxonomy of information security risk assessment (ISRA). Comput. Secur. 2016, 57, 14–30. [Google Scholar] [CrossRef]
- Patiño, S.; Solís, E.F.; Yoo, S.G.; Arroyo, R. ICT risk management methodology proposal for governmental entities based on ISO/IEC 27005. In Proceedings of the 2018 International Conference on eDemocracy & eGovernment (ICEDEG), Ambato, Ecuador, 4–6 April 2018; pp. 75–82. [Google Scholar]
- Zainal, K.; Jali, M.Z. A perception model of spam risk assessment inspired by danger theory of artificial immune systems. Procedia Comput. Sci. 2015, 59, 152–161. [Google Scholar] [CrossRef]
- Alcántara, M.; Melgar, A. Risk management in information security: A systematic review. J. Adv. Inf. Technol. 2016, 7, 1–7. [Google Scholar] [CrossRef]
- Bagheri, S. Investigating Organisational Aspects of Cyber Resilience in Large Organisations. Ph.D. Thesis, University of Tasmania, Hobart, Australia, 2020. [Google Scholar]
- Samy, G.N.; Ahmad, R.; Ismail, Z. A framework for integrated risk management process using survival analysis approach in information security. In Proceedings of the 2010 Sixth International Conference on Information Assurance and Security, Atlanta, GA, USA, 23–25 August 2010; pp. 185–190. [Google Scholar]
- Fischer, E.A. Creating a National Framework for Cybersecurity: An Analysis of Issues and Options; Nova Science Publishers: Hauppauge, NY, USA, 2009. [Google Scholar]
- Mahmoud, M.S.B.; Larrieu, N.; Pirovano, A. A risk propagation based quantitative assessment methodology for network security-aeronautical network case study. In Proceedings of the 2011 Conference on Network and Information Systems Security, La Rochelle, France, 18–21 May 2011; pp. 1–9. [Google Scholar]
- Ross, R.S.; Johnson, L.A.; Katzke, S.W.; Toth, P.R.; Stoneburner, G.; Rogers, G. Guide for Assessing the Security Controls in Federal Information Systems: Building Effective Security Assessment Plans; National Institute of Standards and Technology: Gaithersburg, MA, USA, 2008.
- ISACA; Governance Institute; The Office of Government Commerce. Aligning CobiT, ITIL and ISO 17799 for Business Benefit. 2007. Available online: https://www.itgovernance.co.uk/files/ITIL-COBiT-ISO17799JointFramework.pdf (accessed on 22 May 2024).
- Andersen, C. Successful security control selection using NIST SP 800-53. ISSA I 2009, 1, 12–17. [Google Scholar]
- Singh, A.; Lilja, D.J. Criteria and methodology for grc platform selection. ISACA J. 2010, 1, 32. [Google Scholar]
- Jones, J. An introduction to factor analysis of information risk (fair). Norwich J. Inf. Assur. 2006, 2, 67. [Google Scholar]
- Allen, J. Mastering the Risk/Reward Equation: Optimizing Information Risks to Maximize Business Innovation Rewards; RSA, USA, Industry Report. 2008. Available online: https://www.robinsoninsight.com/wp-content/uploads/2017/07/Risk-Reward-Equation_Security-for-Business-Innovation.pdf (accessed on 22 May 2024).
- Jürgenson, A.; Willemson, J. Processing multi-parameter attacktrees with estimated parameter values. In International Workshop on Security; Springer: Berlin/Heidelberg, Germany, 2007; pp. 308–319. [Google Scholar]
- Kiesling, E.; Strausß, C.; Stummer, C. A multi-objective decision support framework for simulation-based security control selection. In Proceedings of the 2012 Seventh International Conference on Availability, Reliability and Security, Prague, Czech Republic, 20–24 August 2012; pp. 454–462. [Google Scholar]
- Tong, C.K.; Fung, K.; Huang, H.Y.; Chan, K.K. Implementation of ISO17799 and BS7799 in picture archiving and communication system: Local experience in implementation of BS7799 standard. In International Congress Series; Elsevier: Amsterdam, The Netherlands, 2003; Volume 1256, pp. 311–318. [Google Scholar]
- Piatyszek, E.; Karagiannis, G.-M. A model-based approach for a systematic risk analysis of local flood emergency operation plans: A first step toward a decision support system. Nat. Hazards 2012, 61, 1443–1462. [Google Scholar] [CrossRef]
- Al-Hamdani, W.A. Non risk assessment information security assurance model. In Proceedings of the 2009 Information Security Curriculum Development Conference, Kennesaw, Georgia, 25–26 September 2009; pp. 84–90. [Google Scholar]
- Shukla, A.; Katt, B.; Nweke, L.O.; Yeng, P.K.; Weldehawaryat, G.K. System Security Assurance: A Systematic Literature Review. arXiv 2021, arXiv:2110.01904. [Google Scholar] [CrossRef]
- Singh, A.; Lilja, D. STARTS: A decision support architecture for dynamic security configuration management. In Proceedings of the 2009 IEEE International Conference on Industrial Engineering and Engineering Management, Hong Kong, China, 8–11 December 2009; pp. 2185–2191. [Google Scholar]
- Lv, J.-J.; Zhou, Y.-S.; Wang, Y.-Z. A multi-criteria evaluation method of information security controls. In Proceedings of the 2011 Fourth International Joint Conference on Computational Sciences and Optimization, Kunming, China, 15–19 April 2011; pp. 190–194. [Google Scholar]
- Carauta Ribeiro, R.; Dias Canedo, E. Using mcda for selecting criteria of lgpd compliant personal data security. In Proceedings of the 21st Annual International Conference on Digital Government Research, Seoul, Republic of Korea, 15–19 June 2020; pp. 175–184. [Google Scholar]
- Singh, A.; Lilja, D. Improving risk assessment methodology: A statistical design of experiments approach. In Proceedings of the 2nd International Conference on Security of Information and Networks, Famagusta, Cyprus, 6–10 October 2009; pp. 21–29. [Google Scholar]
- Brunner, M.; Sillaber, C.; Breu, R. Towards automation in information security management systems. In Proceedings of the 2017 IEEE International Conference on Software Quality, Reliability and Security (QRS), Prague, Czech Republic, 25–29 July 2017; pp. 160–167. [Google Scholar]
- Hagerty, J.; Verma, K.; Gaughan, D. The Governance Risk Management and Compliance (GRC) Landscape Part 2: Software’s Integral Role in GRC Automation; Gartner, Inc.: Stamford, CT, USA, 2008. [Google Scholar]
- Asosheh, A.; Dehmoubed, B.; Khani, A. A new quantitative approach for information security risk assessment. In Proceedings of the 2009 2nd IEEE International Conference on Computer Science and Information Technology, Beijing, China, 8–11 August 2009; pp. 222–227. [Google Scholar]
- Llansó, T. CIAM: A data-driven approach for selecting and prioritizing security controls. In Proceedings of the 2012 IEEE International Systems Conference SysCon 2012, Vancouver, BC, Canada, 19–22 March 2012; pp. 1–8. [Google Scholar]
- Razaque, A.; Amsaad, F.; Hariri, S.; Almasri, M.; Rizvi, S.S.; Frej, M.B.H. Enhanced grey risk assessment model for support of cloud service provider. IEEE Access 2020, 8, 80812–80826. [Google Scholar] [CrossRef]
- Webb, J.; Ahmad, A.; Maynard, S.B.; Shanks, G. A situation awareness model for information security risk management. Comput. Secur. 2014, 44, 1–15. [Google Scholar] [CrossRef]
- Haji, S.; Tan, Q.; Costa, R.S. A hybrid model for information security risk assessment. Int. J. Adv. Trends Comput. Sci. Eng. 2019, 8, 100–106. [Google Scholar] [CrossRef]
- Sukumar, A.; Mahdiraji, H.A.; Jafari-Sadeghi, V. Cyber risk assessment in small and medium-sized enterprises: A multilevel decision-making approach for small e-tailors. Risk Anal. 2023, 43, 2082–2098. [Google Scholar] [CrossRef] [PubMed]
- Subhash, P.; Qayyum, M.; Mehernadh, K.; Sahit, K.J.; Varsha, C.L.; Hardeep, M.N. Risk assessment threat modelling using an integrated framework to enhance security. J. Theor. Appl. Inf. Technol. 2024, 102, 3857–3867. [Google Scholar]
- Jawhar, S.; Kimble, C.E.; Miller, J.R.; Bitar, Z. Enhancing Cyber Resilience with AI-Powered Cyber Insurance Risk Assessment. In Proceedings of the 2024 IEEE 14th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 8–10 January 2024; pp. 0435–0438. [Google Scholar]
- Chandra, N.A.; Ramli, K.; Ratna, A.A.P.; Gunawan, T.S. Information Security Risk Assessment Using Situational Awareness Frameworks and Application Tools. Risks 2022, 10, 165. [Google Scholar] [CrossRef]
- Supriyadi, Y.; Hardani, C.W. Information system risk scenario using COBIT 5 for risk and NIST SP 800-30 Rev. 1 a case study. In Proceedings of the 2018 3rd International Conference on Information Technology, Information System and Electrical Engineering (ICITISEE), Yogyakarta, Indonesia, 13–14 November 2018; pp. 287–291. [Google Scholar]
- Wangen, G. Information Security Risk Assessment: A Method Comparison. Computer 2017, 50, 52–61. [Google Scholar] [CrossRef]
- Kiran, K.; Reddy, L.; Haritha, N.L. A compartive analysis on risk assessment information security models. Int. J. Comput. Appl. 2013, 82, 41–47. [Google Scholar] [CrossRef]
- Abbass, W.; Baina, A.; Bellafkih, M. Using EBIOS for risk management in critical information infrastructure. In Proceedings of the 2015 5th World Congress on Information and Communication Technologies (WICT), Marrakech, Morocco, 14–16 December 2015; pp. 107–112. [Google Scholar]
- Mullerova, J.; Nemec, V. Risk assessment RM/RA CRAMM–quantitative method for environmental, technology and social threats. In Proceedings of the International Multidisciplinary Scientific GeoConference: SGEM, Albena, Bulgaria, 28 June–6 July 2019; Volume 19, pp. 279–285. [Google Scholar]
- Kim, H.J. Three Approaches to Risk Management in the Cloud. Inf. Resour. Manag. J. (IRMJ) 2022, 35, 1–12. [Google Scholar] [CrossRef]
SDLC Phases | Phase Characteristics | RMA Support |
---|---|---|
Phase 1: Initiation | An IT system is deemed necessary, and the goal and scope of the IT system are defined | The identified dangers aid in the formulation of the system requirements. |
Phase 2: Development or Acquisition | Design, procurement, development of programming, or other construction of the information technology system. | The hazards found during this phase can be utilized to help with the IT system’s security analysis. |
Phase 3: Implementation | Configuration, enablement, testing, and verification of system security features are required. | System implementation is evaluated against its specifications and within a modeled operating environment using the risk management method. |
Phase 4: Operation Maintenance | The system goes about its business. Adding hardware and software to the system is a common practice for system modifications. | Periodic system reauthorization (or reaccreditation) or substantial modifications to an IT system necessitate risk management actions. |
Phase 5: Disposal | This step may include the disposal of data, hardware, and software. | System components that will be discarded or replaced will have risk management actions carried out to guarantee that old hardware and software are disposed of correctly. |
Ref. | Model | Results |
---|---|---|
[75] | ISO/IEC 27005 | This standard offers a comprehensive structure for effectively handling and mitigating risks related to information security. The main focus is on the identification, assessment, and mitigation of risks to establish efficient information security protocols inside businesses. Despite its widespread acceptance, this framework presents a multitude of intricate regulations that might be difficult to implement without the assistance of specific examples. |
[76] | NIST SP800-30 | Information technology risk management is rigorous with NIST principles. Risk assessment, mitigation, and monitoring demonstrate the necessity for an IT-specific risk management plan. Its various, intricate processes need competence to perform. |
[77] | OCTAVE | The OCTAVE risk management method addresses risks inside organizations by conducting an Operationally Critical Threat, Asset, and Vulnerability Evaluation. The methodology encompasses the process of identifying assets, profiling potential threats, and developing plans for protection. Qualitative approaches may not provide explicit organizational rules. |
[78] | IRAM | The Information Risk Assessment Methodology (IRAM) is a risk assessment technique proposed by the Information Security Forum. It connects security measures with the organization’s goals. Its generalizability may be limited due to its heavy reliance on expert opinion and organizational context. |
[79] | EBIOS | EBIOS offers a thorough method for detecting and evaluating security requirements. It is extensively used in French enterprises and the government, providing a methodical approach to controlling security threats. However, it often prioritizes broad assessments without a thorough and specific methodology. |
[80,81] | CRAMM | The CRAMM technique provides a comprehensive strategy for effectively managing information security risks via the use of statistical and analytical tools. The document offers a well-organized strategy for establishing a strong security system by doing thorough analysis and using effective risk management techniques. |
[64] | SDEA | This methodology uses statistical experimental design to address risk management, offering a quantitative structure for assessing and reducing hazards. The risk management strategy integrates statistical and qualitative methodologies to provide a comprehensive analysis. |
[62] | McEM | This approach assesses information security measures by using several criteria to strike a balance between different elements and attain optimum security management. It provides a systematic method for making decisions when implementing security controls. |
[68] | CIAM | CIAM is a systematic approach that uses data to choose and rank security measures. The main objective is to assess the efficiency of controls and prioritize high-priority threats to improve overall security measures. |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Alsafwani, N.; Fazea, Y.; Alnajjar, F. Strategic Approaches in Network Communication and Information Security Risk Assessment. Information 2024, 15, 353. https://doi.org/10.3390/info15060353
Alsafwani N, Fazea Y, Alnajjar F. Strategic Approaches in Network Communication and Information Security Risk Assessment. Information. 2024; 15(6):353. https://doi.org/10.3390/info15060353
Chicago/Turabian StyleAlsafwani, Nadher, Yousef Fazea, and Fuad Alnajjar. 2024. "Strategic Approaches in Network Communication and Information Security Risk Assessment" Information 15, no. 6: 353. https://doi.org/10.3390/info15060353
APA StyleAlsafwani, N., Fazea, Y., & Alnajjar, F. (2024). Strategic Approaches in Network Communication and Information Security Risk Assessment. Information, 15(6), 353. https://doi.org/10.3390/info15060353