Cited By
View all- Oliveira MGoldman AYoder J(2024)Information Security Investments: How to Prioritize?Proceedings of the 20th Brazilian Symposium on Information Systems10.1145/3658321.3658363(1-8)Online publication date: 20-May-2024
In general, an information security risk assessment (ISRA) method produces risk estimates, where risk is the product of the probability of occurrence of an event and the associated consequences for the given organization. ISRA practices vary among ...
Information is a perennially significant business asset in all organizations. Therefore, it must be protected as any other valuable asset. This is the objective of information security, and an information security program provides this kind of ...
Acceptable risk is the residual risk that follows the implementation of the safeguard. Residual risk is the qualitative or quantitative risk that could not be removed, or which was accepted. Managing the residual risk is the core of risk management. ...
Springer-Verlag
Berlin, Heidelberg