Model-Driven Risk Analysis

Model-Driven Risk Analysis

Bjørnar Solhaug / Ketil Stølen / Mass Soldal Lund

69,25 €
IVA incluido
Disponible
Editorial:
Springer Nature B.V.
Año de edición:
2014
ISBN:
9783642447013
69,25 €
IVA incluido
Disponible

Selecciona una librería:

  • Librería Samer Atenea
  • Librería Aciertas (Toledo)
  • Kálamo Books
  • Librería Perelló (Valencia)
  • Librería Elías (Asturias)
  • Donde los libros
  • Librería Kolima (Madrid)
  • Librería Proteo (Málaga)

The term 'risk' is known from many fields, and we are used to references to contractual risk, economic risk, operational risk, legal risk, security risk, and so forth. We conduct risk analysis, using either offensive or defensive approaches to identify and assess risk. Offensive approaches are concerned with balancing potential gain against risk of investment loss, while defensive approaches are concerned with protecting assets that already exist.In this book, Lund, Solhaug and Stølen focus on defensive risk analysis, and more explicitly on a particular approach called CORAS. CORAS is a model-driven method for defensive risk analysis featuring a tool-supported modelling language specially designed to model risks. Their book serves as an introduction to risk analysis in general, including the central concepts and notions in risk analysis and their relations. The authors’ aim is to support risk analysts in conducting structured and stepwise risk analysis. To this end, the book is divided into three main parts. Part I of the book introduces and demonstrates the central concepts and notation used in CORAS, and is largely example-driven. Part II gives a thorough description of the CORAS method and modelling language. After having completed this part of the book, the reader should know enough to use the method in practice. Finally, Part III addresses issues that require special attention and treatment, but still are often encountered in real-life risk analysis and for which CORAS offers helpful advice and assistance. This part also includes a short presentation of the CORAS tool support.The main target groups of the book are IT practitioners and students at graduate or undergraduate level. They will appreciate a concise introduction into the emerging field of risk analysis, supported by a sound methodology, and completed with numerous examples and detailed guidelines.

Artículos relacionados

  • Strategic Data-Based Wisdom in the Big Data Era
    Deanna Klein / John Girard / Kristi Berg
    The ability to uncover, share, and utilize knowledge is one of the most vital components to the success of any organization. While new technologies and techniques of knowledge dissemination are promising, there is still a struggle to derive and circulate meaningful information from large data sets. Strategic Data-Based Wisdom in the Big Data Era combines the latest empirical re...
  • Enterprise Service Computing
    Robin G. Qiu / Robin GQiu
    ...
  • Harnessing Knowledge Dynamics
    Mark E. Nissen / Mark ENissen
    ...
  • Effective Cybersecurity Operations for Enterprise-Wide Systems
    Cybersecurity, or information technology security (I/T security), is the protection of computer systems and networks from information disclosure; theft of or damage to their hardware, software, or electronic data; as well as from the disruption or misdirection of the services they provide. The field is becoming increasingly critical due to the continuously expanding reliance on...
    Disponible

    248,86 €

  • IT for Business
    John Young
    IT for Business: A Student’s Guide to the Technology of Business provides readers with a comprehensive understanding of the role and application of information technology in the business world. Each chapter in the book focuses on a different aspect of IT as it relates to business. The opening chapter sets the stage by discussing the importance of developing a keen understanding...
    Disponible

    140,50 €

  • Evolution of Cross-Sector Cyber Intelligent Markets
    Eugene J. Lewis
    In today’s digital age, cyber threats have become an ever-increasing risk to businesses, governments, and individuals worldwide. The deep integration of technology into every facet of modern life has given rise to a complex and interconnected web of vulnerabilities. As a result, traditional, sector-specific approaches to cybersecurity have proven insufficient in the face of the...
    Disponible

    275,51 €