Abstract
The need of continuous control of the IT security in an organisation has increased as the organisations dependencies of computers has increased. To make such analysis simpler computer aided systems (tools) have been developed.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
A. M. Anderson, D. Longley and A. B. Tickle, “The Risk Data Repository: a novel approach to security risk modelling”, Proceeding of the Ninth IFIP International Symposium on Computer Security, IFIP/Sec’93, Deerhurst, Ontario, Canada, May 1993.
P. G. W. Keen, “Shaping the Future; Business Design through Information Technology”, Harvard Business School Press, 1991.
K. Otwell and B. Aldridge, “On the Automation of Computer Security Risk Management”, Proceedings 3rd International Computer Security Risk Model Builders Workshop, Santa Fe, New Mexico, August 1990.
G. Wahlgren and J. Carroll, “General System Theoretic Model of Info SecMan”, Proceedings IFIP Working Group 11.1 workshop on information security management, Singapore, May 1992.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1995 IFIP International Federation for Information Processing
About this chapter
Cite this chapter
Wahlgren, G. (1995). An object-oriented approach to an IT risk management system. In: Eloff, J.H.P., von Solms, S.H. (eds) Information Security — the Next Decade. IFIP Advances in Information and Communication Technology. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-34873-5_7
Download citation
DOI: https://doi.org/10.1007/978-0-387-34873-5_7
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-5041-2910-7
Online ISBN: 978-0-387-34873-5
eBook Packages: Springer Book Archive