Browse Results

Showing 44,926 through 44,950 of 54,487 results

Risk and the Theory of Security Risk Assessment (Advanced Sciences and Technologies for Security Applications)

by Carl S. Young

This book provides the conceptual foundation of security risk assessment and thereby enables reasoning about risk from first principles. It presents the underlying theory that is the basis of a rigorous and universally applicable security risk assessment methodology. Furthermore, the book identifies and explores concepts with profound operational implications that have traditionally been sources of ambiguity if not confusion in security risk management. Notably, the text provides a simple quantitative model for complexity, a significant driver of risk that is typically not addressed in security-related contexts. Risk and The Theory of Security Risk Assessment is a primer of security risk assessment pedagogy, but it also provides methods and metrics to actually estimate the magnitude of security risk. Concepts are explained using numerous examples, which are at times both enlightening and entertaining. As a result, the book bridges a longstanding gap between theory and practice, and therefore will be a useful reference to students, academics and security practitioners.

Risk Assessment

by Marvin Rausand

An introduction to risk assessment that utilizes key theory and state-of-the-art applications With its balanced coverage of theory and applications along with standards and regulations, Risk Assessment: Theory, Methods, and Applications serves as a comprehensive introduction to the topic. The book serves as a practical guide to current risk analysis and risk assessment, emphasizing the possibility of sudden, major accidents across various areas of practice from machinery and manufacturing processes to nuclear power plants and transportation systems.The author applies a uniform framework to the discussion of each method, setting forth clear objectives and descriptions, while also shedding light on applications, essential resources, and advantages and disadvantages. Following an introduction that provides an overview of risk assessment, the book is organized into two sections that outline key theory, methods, and applications.Introduction to Risk Assessment defines key concepts and details the steps of a thorough risk assessment along with the necessary quantitative risk measures. Chapters outline the overall risk assessment process, and a discussion of accident models and accident causation offers readers new insights into how and why accidents occur to help them make better assessments.Risk Assessment Methods and Applications carefully describes the most relevant methods for risk assessment, including preliminary hazard analysis, HAZOP, fault tree analysis, and event tree analysis. Here, each method is accompanied by a self-contained description as well as workflow diagrams and worksheets that illustrate the use of discussed techniques. Important problem areas in risk assessment, such as barriers and barrier analysis, human errors, and human reliability, are discussed along with uncertainty and sensitivity analysis.Each chapter concludes with a listing of resources for further study of the topic, and detailed appendices outline main results from probability and statistics, related formulas, and a listing of key terms used in risk assessment. A related website features problems that allow readers to test their comprehension of the presented material and supplemental slides to facilitate the learning process.Risk Assessment is an excellent book for courses on risk analysis and risk assessment at the upper-undergraduate and graduate levels. It also serves as a valuable reference for engineers, researchers, consultants, and practitioners who use risk assessment techniques in their everyday work.

Risk Assessment and Decision Analysis with Bayesian Networks

by Norman Fenton Martin Neil

Since the first edition of this book published, Bayesian networks have become even more important for applications in a vast array of fields. This second edition includes new material on influence diagrams, learning from data, value of information, cybersecurity, debunking bad statistics, and much more. Focusing on practical real-world problem-solving and model building, as opposed to algorithms and theory, it explains how to incorporate knowledge with data to develop and use (Bayesian) causal models of risk that provide more powerful insights and better decision making than is possible from purely data-driven solutions. Features Provides all tools necessary to build and run realistic Bayesian network models Supplies extensive example models based on real risk assessment problems in a wide range of application domains provided; for example, finance, safety, systems reliability, law, forensics, cybersecurity and more Introduces all necessary mathematics, probability, and statistics as needed Establishes the basics of probability, risk, and building and using Bayesian network models, before going into the detailed applications A dedicated website contains exercises and worked solutions for all chapters along with numerous other resources. The AgenaRisk software contains a model library with executable versions of all of the models in the book. Lecture slides are freely available to accredited academic teachers adopting the book on their course.

Risk Assessment and Risk-Driven Testing

by Thomas Bauer Jürgen Großmann Fredrik Seehusen Ketil Stølen Marc-Florian Wendland

This book constitutes the thoroughly refereed conference proceedings of the First International Workshop on Risk Assessment and Risk-driven Testing, RISK 2013, held in conjunction with 25th IFIP International Conference on Testing Software and Systems, ICTSS 2013, in Istanbul, Turkey, in November 2013. The revised full papers were carefully reviewed and selected from 13 submissions. The papers are organized in topical sections on risk analysis, risk modeling and risk-based testing.

Risk Assessment and Risk-Driven Testing

by Fredrik Seehusen Michael Felderer Jürgen Großmann Marc-Florian Wendland

This book constitutes the thoroughly refereed conferenceproceedings of the Third International Workshop on Risk Assessment andRisk-driven Testing, RISK 2015, held in conjunction with the OMG TechnicalMeeting in Berlin, Germany, in June 2015. The revised 8 full papers were carefully reviewed and selectedfrom 12 submissions. This workshop addresses systematic approaches that combinerisk assessment and testing. Also, the workshop was structured into the threesessions namely Risk Assessment, Risk and Development and Security Testing.

Risk Assessment and Risk-Driven Testing: First International Workshop, RISK 2013, Held in Conjunction with ICTSS 2013, Istanbul, Turkey, November 12, 2013. Revised Selected Papers (Lecture Notes in Computer Science #8418)

by Thomas Bauer, Jürgen Großmann, Fredrik Seehusen, Ketil Stølen and Marc-Florian Wendland

This book constitutes the thoroughly refereed conference proceedings of the First International Workshop on Risk Assessment and Risk-driven Testing, RISK 2013, held in conjunction with 25th IFIP International Conference on Testing Software and Systems, ICTSS 2013, in Istanbul, Turkey, in November 2013. The revised full papers were carefully reviewed and selected from 13 submissions. The papers are organized in topical sections on risk analysis, risk modeling and risk-based testing.

Risk-Conscious Operations Management: An Integrated Paradigm for Complex Engineering System (Risk, Reliability and Safety Engineering)

by Prabhakar V. Varde

This book presents various concepts and applications related to risk-conscious operations management. It also provides an overview of the risk-based engineering – fundamental to the concept of risk-conscious operations management. It presents the reliability concept to support Dependency Modelling, which includes hardware systems structures and components for reliability improvement and risk reduction. The book further develops and builds attributes and model for risk-conscious culture – critical to characterize operational approach to risk and presents human factor modelling, where it works on developing an approach for human error precursor analysis. This book will be useful for students, researchers, academicians and professionals working on identifying risk and reliability issues in complex safety and mission critical systems. It will also be beneficial for industry risk-and-reliability experts and operational safety staff working in the complex engineering systems.

Risk Management

by Glen B. Alleman Jon M. Quigley

Project success is an elusive goal in every business or technical domain. Project failure usually results from unhandled risks to the technical, cost, and schedule aspects of the project. There are four primary root causes of project failure. Unrealistic performance expectation, with missing Measures of Effectiveness Unrealistic cost and schedule estimates based on inadequate risk adjusted growth models Inadequate assessment of risk and unmitigated exposure to these risks without proper handling strategies Unanticipated technical issues with alternative plans and solutions to maintain the effectiveness of the project processes and its deliverables Risk Management provides a comprehensive overview of the people, principles, processes, and practices as the fundamental base upon which an effective risk management system resides. However, this does not guarantee effective risk management and successful projects and businesses. The first half of the book describes risk management processes, as well as a delineation between risk and hazards and how these are connected. The second half of the book provides industry examples of the approach to risk management in specific context and with specific approaches and artifacts where applicable.The book focuses on risks created by uncertainty, their identification, and the corrective and preventive actions needed to address these risks to increase the probability of project success. The book’s goal is to provide a context-driven framework, developing a foundation for a rational approach to risk management that makes adaptation to circumstances as easy as possible.

Risk Management: Concepts and Guidance, Fifth Edition

by Carl L. Pritchard, PMP, PMI-RMP, EVP

This new edition of Risk Management: Concepts and Guidance supplies a look at risk in light of current information, yet remains grounded in the history of risk practice. Taking a holistic approach, it examines risk as a blend of environmental, programmatic, and situational concerns. Supplying comprehensive coverage of risk management tools, practices, and protocols, the book presents powerful techniques that can enhance organizational risk identification, assessment, and management—all within the project and program environments.Updated to reflect the Project Management Institute’s A Guide to the Project Management Body of Knowledge (PMBOK® Guide), Fifth Edition, this edition is an ideal resource for those seeking Project Management Professional and Risk Management Professional certification. Emphasizing greater clarity on risk practice, this edition maintains a focus on the ability to apply "planned clairvoyance" to peer into the future. The book begins by analyzing the various systems that can be used to apply risk management. It provides a fundamental introduction to the basics associated with particular techniques, clarifying the essential concepts of risk and how they apply in projects. The second part of the book presents the specific techniques necessary to successfully implement the systems described in Part I. The text addresses project risk management from the project manager’s perspective. It adopts PMI’s perspective that risk is both a threat and an opportunity, and it acknowledges that any effective risk management practice must look at the potential positive events that may befall a project, as well as the negatives.Providing coverage of the concepts that many project management texts ignore, such as the risk response matrix and risk models, the book includes appendices filled with additional reference materials and supporting details that simplifying some of the most complex aspects of risk management.

Risk Management for IT Projects

by Bennet Lientz Lee Larssen

The rate of failure of IT projects has remained little changed in survey after survey over the past 15-20 years—over 40-50%. This has happened in spite of new technology, innovative methods and tools, and different management methods. Why does this happen? Why can’t the situation be better? One reason is that many think of each IT effort as unique. In reality many IT projects are very similar at a high, strategic level. Where they differ is in the people and exact events—the detail. If you read the literature or have been in information systems or IT for some time, you have seen the same reasons for failure and the same problems and issues recur again and again. In this book IT Management experts Ben Lientz and Lee Larssen show you how to identify and track the recurring issues leading to failure in IT projects and provide a proven, modern method for addressing them. By following the recommendations in this books readers can significantly reduce the risk of IT failures and increase the rate of success. Benefits of using this approach:• Issues are identified earlier—giving more time for solution and action.• Issues are resolved more consistently since the approach tracks on their repetition.• You get an early warning of problems in IT work—before the budget or schedule fall apart.• Management tends to have more realistic expectations with an awareness of issues.• Users and managers have greater confidence in IT due to the improved handling of issues.• Since the number of issues tends to stabilize in an organization, the IT organization and management get better at detecting, preventing, and dealing with issues over time—cumulative improvement.• Giving attention to issues make users more realistic in their requests and acts to deter requirement changes and scope creep.

Risk Management in Software Development Projects

by John McManus

Very few software projects are completed on time, on budget, and to their original specification causing the global IT software industry to lose billions each year in project overruns and reworking software. Research supports that projects usually fail because of management mistakes rather than technical mistakes. Risk Management in Software Development Projects focuses on what the practitioner needs to know about risk in the pursuit of delivering software projects.Risk Management in Software Development Projects will help all practicing IT Project Managers and IT Managers understand:* Key components of the risk management process * Current processes and best practices for software risk identification * Techniques of risk analysis * Risk Planning * Management processes and be able to develop the process for various organizations

Risk Modeling, Assessment, and Management

by Yacov Y. Haimes

Examines timely multidisciplinary applications, problems, and case histories in risk modeling, assessment, and managementRisk Modeling, Assessment, and Management, Third Edition describes the state of the art of risk analysis, a rapidly growing field with important applications in engineering, science, manufacturing, business, homeland security, management, and public policy. Unlike any other text on the subject, this definitive work applies the art and science of risk analysis to current and emergent engineering and socioeconomic problems. It clearly demonstrates how to quantify risk and construct probabilities for real-world decision-making problems, including a host of institutional, organizational, and political issues.Avoiding higher mathematics whenever possible, this important new edition presents basic concepts as well as advanced material. It incorporates numerous examples and case studies to illustrate the analytical methods under discussion and features restructured and updated chapters, as well as:A new chapter applying systems-driven and risk-based analysis to a variety of Homeland Security issuesAn accompanying FTP site--developed with Professor Joost Santos--that offers 150 example problems with an Instructor's Solution Manual and case studies from a variety of journalsCase studies on the 9/11 attack and Hurricane KatrinaAn adaptive multiplayer Hierarchical Holographic Modeling (HHM) game added to Chapter ThreeThis is an indispensable resource for academic, industry, and government professionals in such diverse areas as homeland and cyber security, healthcare, the environment, physical infrastructure systems, engineering, business, and more. It is also a valuable textbook for both undergraduate and graduate students in systems engineering and systems management courses with a focus on our uncertain world.

Risk Thinking for Cloud-Based Application Services

by Eric Bauer

Many enterprises are moving their applications and IT services to the cloud. Better risk management results in fewer operational surprises and failures, greater stakeholder confidence and reduced regulatory concerns; proactive risk management maximizes the likelihood that an enterprise’s objectives will be achieved, thereby enabling organizational success. This work methodically considers the risks and opportunities that an enterprise taking their applications or services onto the cloud must consider to obtain the cost reductions and service velocity improvements they desire without suffering the consequences of unacceptable user service quality.

Risks and Resilience of Collaborative Networks

by Luis M. Camarinha-Matos Frédérick Bénaben Willy Picard

This book constitutes the refereed proceedings of the 16th IFIP WG 5. 5 Working Conference on Virtual Enterprises, PRO-VE 2015, held in Albi, France, in October 2015. The 61 revised papers were carefully selected from 126 submissions. They provide a comprehensive overview of identified challenges and recent advances in various collaborative network (CN) domains and their applications, with a strong focus on the following areas: risks in collaborative networks; agility and resilience in collaborative networks; collaboration frameworks; logistics and transportation; innovation networks; governance in collaborative networks; collaborative communities; information and assets sharing; business processes; performance and optimization; and network formation.

Risks and Security of Internet and Systems

by Frédéric Cuppens Nora Cuppens Jean-Louis Lanet Axel Legay

This book constitutes the revised selected papers from the 11th International Conference on Risk and Security of Internet and Systems, CRISIS 2016, held in Roscoff, France, in September 2016. The 17 full papers presented in this volume were carefully reviewed and selected from 24 submissions. They cover diverse research themes, ranging from classic topics, such as intrusion detection, applied cryptography, formal methods and methodology for risk and security analysis, to emerging issues, such as ransomware and security of software defined networking or virtualization techniques.

Risks and Security of Internet and Systems: 18th International Conference, CRiSIS 2023, Rabat, Morocco, December 6–8, 2023, Revised Selected Papers (Lecture Notes in Computer Science #14529)

by Frédéric Cuppens Guillermo Navarro-Arribas Nora Cuppens Abderrahim Ait Wakrime Redouane Benaini

This book constitutes the revised selected papers of the 18th International Conference on Risks and Security of Internet and Systems, CRiSIS 2023, which took place in Rabat, Morocco, during December 6–8, 2023. The 13 full papers and 2 short papers included in this volume were carefully reviewed and selected from 25 submissions. The papers detail security issues in internet-related applications, networks and systems.

Risks and Security of Internet and Systems: 14th International Conference, CRiSIS 2019, Hammamet, Tunisia, October 29–31, 2019, Proceedings (Lecture Notes in Computer Science #12026)

by Nora Cuppens-Boulahia Frédéric Cuppens Slim Kallel Ahmed Hadj Kacem

This book constitutes the revised selected papers from the 14th International Conference on Risks and Security of Internet and Systems, CRiSIS 2019, held in Hammamet, Tunisia, in October 2019.The 20 full papers and 4 short papers presented in this volume were carefully reviewed and selected from 64 submissions. They cover diverse research themes that range from classic topics, such as risk analysis and management; access control and permission; secure embedded systems; network and cloud security; information security policy; data protection and machine learning for security; distributed detection system and blockchain.

Risks and Security of Internet and Systems: 11th International Conference, Crisis 2016, Roscoff, France, September 5-7, 2016, Revised Selected Papers (Lecture Notes in Computer Science #10158)

by Joaquin Garcia-Alfaro Axel Legay Jean-Louis Lanet Frédéric Cuppens Nora Cuppens

This book constitutes the revised selected papers from the 12th International Conference on Risk and Security of Internet and Systems, CRISIS 2017, held in Dinard, France, in September 2017.The 12 full papers and 5 short papers presented in this volume were carefully reviewed and selected from 42 submissions. They cover diverse research themes, ranging from classic topics, such as vulnerability analysis and classification; apps security; access control and filtering; cloud security; cyber-insurance and cyber threat intelligence; human-centric security and trust; and risk analysis.

Risks and Security of Internet and Systems: 15th International Conference, CRiSIS 2020, Paris, France, November 4–6, 2020, Revised Selected Papers (Lecture Notes in Computer Science #12528)

by Joaquin Garcia-Alfaro Jean Leneutre Nora Cuppens Reda Yaich

This book constitutes the proceedings of the 15th International Conference on Risks and Security of Internet and Systems, CRiTIS 2020, which took place during November 4-6, 2020. The conference was originally planned to take place in Paris, France, but had to change to an online format due to the COVID-19 pandemic. The 16 full and 7 short papers included in this volume were carefully reviewed and selected from 44 submissions. In addition, the book contains one invited talk in full paper length. The papers were organized in topical sections named: vulnerabilities, attacks and intrusion detection; TLS, openness and security control; access control, risk assessment and security knowledge; risk analysis, neural networks and Web protection; infrastructure security and malware detection.

Risks and Security of Internet and Systems: 17th International Conference, CRiSIS 2022, Sousse, Tunisia, December 7-9, 2022, Revised Selected Papers (Lecture Notes in Computer Science #13857)

by Slim Kallel Mohamed Jmaiel Mohammad Zulkernine Ahmed Hadj Kacem Frédéric Cuppens Nora Cuppens

This book constitutes the proceedings of the 17th International Conference on Risks and Security of Internet and Systems, CRiSIS 2022, which took place in Sousse, Tunesia, during December 7-9, 2022. The 14full papers and 4 short papers included in this volume were carefully reviewed and selected from 39 submissions. The papers detail security issues in internet-related applications, networks and systems.

Risks and Security of Internet and Systems

by Costas Lambrinoudakis Alban Gabillon

This book constitutes the thoroughly refereedpost-conference proceedings of the 10th International Conference on Risks andSecurity of Internet Systems, CRiSIS 2015, held in Mytilene, Lesbos Island,Greece, in July 2015. The 18 full papers presented were selected from 50 submissions. The papers sessions that have covered a broad range of topics: trust and privacyissues, privacy policies and policy based protocols, risk management, riskanalysis and vulnerability assessment, cloud systems and cryptography, andattack and security measures.

Risks and Security of Internet and Systems

by Javier Lopez Indrajit Ray Bruno Crispo

This book constitutes the thoroughly refereed post- conference proceedings of the Ninth International Conference on Risks and Security of Internet Systems, CRiSIS 2014, held in Trento, Italy, in August 2014. The 13 full papers and 6 short papers presented were selected from 48 submissions. They explore risks and security issues in Internet applications, networks and systems covering topics such as trust, security risks and threats, intrusion detection and prevention, access control and security modeling.

Risks and Security of Internet and Systems: 16th International Conference, CRiSIS 2021, Virtual Event, Ames, USA, November 12–13, 2021, Revised Selected Papers (Lecture Notes in Computer Science #13204)

by Bo Luo Mohamed Mosbah Frédéric Cuppens Lotfi Ben Othmane Nora Cuppens Slim Kallel

This book constitutes the proceedings of the 17th International Conference on Risks and Security of Internet and Systems, CRiSIS 2021, which took place during November 11-13, 2021. The conference was originally planned to take place in Ames, IA, USA, but had to change to an online format due to the COVID-19 pandemic.The 9 full and 3 short papers included in this volume were carefully reviewed and selected from 23 submissions. The papers were organized in topical sections named: CPS and hardware security; attacks, responses, and security management; network and data security.

Risks and Security of Internet and Systems: 13th International Conference, CRiSIS 2018, Arcachon, France, October 16–18, 2018, Revised Selected Papers (Lecture Notes in Computer Science #11391)

by Akka Zemmari Mohamed Mosbah Nora Cuppens-Boulahia Frédéric Cuppens

This book constitutes the revised selected papers from the 13th International Conference on Risks and Security of Internet and Systems, CRiSIS 2018, held in Arcachon, France, in October 2018. The 12 full papers and 6 short papers presented in this volume were carefully reviewed and selected from 34 submissions. They cover diverse research themes that range from classic topics, such as vulnerability analysis and classification; apps security; access control and filtering; cloud security; cyber-insurance and cyber threat intelligence; human-centric security and trust; and risk analysis.

Risks, Controls, and Security: Concepts and Applications

by Vasant Raval Ashok Fichadia

An accountant's guide to managing control risks In today's networked world, security and risk control are no longer just the province of the IT department. Accountants and other business managers who are responsible for corporate risk management must fully understand the control and security risks that can affect the financial health of the entire organization. Risks,Controls and Security: Concepts and Applications introduces you to today's control risks and how to manage them. Beginning with basic systems controls and security awareness, the book provides you with a clear comprehension of the concepts,issues, and techniques of information security in a networked environment. Moving from theory to application, you'll cover all the key security principles that are applicable to all businesses,including e-businesses: * Enterprise risk management * Control and security frameworks * Basic cryptography and public key infrastructure * Security for operating systems, applications, database management systems, and telecommunications * Network and web security * Policy, regulation, and ethics Real-world problem scenarios and a wealth of pedagogical features--discussion questions, short exercises, example cases, and"concept maps" that help you visualize the material--ensure your confident grasp of the material and enable you to put "security into practice." Designed for practicing professionals as well as for students in accounting, business management, and computer science, Risks,Controls and Security will prepare you well for meeting the challenge of protecting information assets.

Refine Search

Showing 44,926 through 44,950 of 54,487 results