Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Security Risk Assessment

Exploring Security in Software Architecture and Design
The process of risk identification, risk estimation, and risk evaluation specialized towards security.
Published in Chapter:
An Evaluation of a Test-Driven Security Risk Analysis Approach Based on Two Industrial Case Studies
Gencer Erdogan (SINTEF Digital, Norway), Phu H. Nguyen (SINTEF Digital, Norway), Fredrik Seehusen (SINTEF Digital, Norway), Ketil Stølen (SINTEF Digital, Norway), Jon Hofstad (PWC, Norway), and Jan Øyvind Aagedal (Equatex, Norway)
Copyright: © 2019 |Pages: 35
DOI: 10.4018/978-1-5225-6313-6.ch004
Abstract
Risk-driven testing and test-driven risk assessment are two strongly related approaches, though the latter is less explored. This chapter presents an evaluation of a test-driven security risk assessment approach to assess how useful testing is for validating and correcting security risk models. Based on the guidelines for case study research, two industrial case studies were analyzed: a multilingual financial web application and a mobile financial application. In both case studies, the testing yielded new information, which was not found in the risk assessment phase. In the first case study, new vulnerabilities were found that resulted in an update of the likelihood values of threat scenarios and risks in the risk model. New vulnerabilities were also identified and added to the risk model in the second case study. These updates led to more accurate risk models, which indicate that the testing was indeed useful for validating and correcting the risk models.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Early Detection and Recovery Measures for Smart Grid Cyber-Resilience
Identifying the vulnerabilities of a system along with the possible worst-case scenarios as well as the evaluation of total property losses in case of such events. This is also referred to as “vulnerability analysis” in the literature.
Full Text Chapter Download: US $37.50 Add to Cart
Detecting Intrusions in Cyber-Physical Systems of Smart Cities: Challenges and Directions
Identifying the vulnerabilities of a system along with the possible worst-case scenarios as well as their probabilities and the evaluation of total property losses in case of such events. This activity generally performed during the establishment of security services for a network or computer system as a part of the provisioning of information security services.
Full Text Chapter Download: US $37.50 Add to Cart
Security and Privacy Requirements Engineering
A risk assessment that is specific to security concerns and has goals that include the implementation of authentication and authorization systems.
Full Text Chapter Download: US $37.50 Add to Cart
A Case Study of Decision Support System and Warehouse Management System Integration
Identifying the vulnerabilities of a system along with the possible worst-case scenarios as well as the evaluation of total property losses in case of such events.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR