Cargando…

Model-Driven Risk Analysis The CORAS Approach /

The term "risk" is known from many fields, and we are used to references to contractual risk, economic risk, operational risk, legal risk, security risk, and so forth. We conduct risk analysis, using either offensive or defensive approaches to identify and assess risk. Offensive approaches...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Lund, Mass Soldal (Autor), Solhaug, Bjørnar (Autor), Stølen, Ketil (Autor)
Autor Corporativo: SpringerLink (Online service)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2011.
Edición:1st ed. 2011.
Temas:
Acceso en línea:Texto Completo

MARC

LEADER 00000nam a22000005i 4500
001 978-3-642-12323-8
003 DE-He213
005 20220116202615.0
007 cr nn 008mamaa
008 101029s2011 gw | s |||| 0|eng d
020 |a 9783642123238  |9 978-3-642-12323-8 
024 7 |a 10.1007/978-3-642-12323-8  |2 doi 
050 4 |a QA76.9.M3 
072 7 |a KJQ  |2 bicssc 
072 7 |a BUS083000  |2 bisacsh 
072 7 |a KJQ  |2 thema 
082 0 4 |a 004.068  |2 23 
100 1 |a Lund, Mass Soldal.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
245 1 0 |a Model-Driven Risk Analysis  |h [electronic resource] :  |b The CORAS Approach /  |c by Mass Soldal Lund, Bjørnar Solhaug, Ketil Stølen. 
250 |a 1st ed. 2011. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg :  |b Imprint: Springer,  |c 2011. 
300 |a XVI, 460 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
520 |a The term "risk" is known from many fields, and we are used to references to contractual risk, economic risk, operational risk, legal risk, security risk, and so forth. We conduct risk analysis, using either offensive or defensive approaches to identify and assess risk. Offensive approaches are concerned with balancing potential gain against risk of investment loss, while defensive approaches are concerned with protecting assets that already exist. In this book, Lund, Solhaug and Stølen focus on defensive risk analysis, and more explicitly on a particular approach called CORAS. CORAS is a model-driven method for defensive risk analysis featuring a tool-supported modelling language specially designed to model risks. Their book serves as an introduction to risk analysis in general, including the central concepts and notions in risk analysis and their relations. The authors' aim is to support risk analysts in conducting structured and stepwise risk analysis. To this end, the book is divided into three main parts. Part I of the book introduces and demonstrates the central concepts and notation used in CORAS, and is largely example-driven. Part II gives a thorough description of the CORAS method and modelling language. After having completed this part of the book, the reader should know enough to use the method in practice. Finally, Part III addresses issues that require special attention and treatment, but still are often encountered in real-life risk analysis and for which CORAS offers helpful advice and assistance. This part also includes a short presentation of the CORAS tool support. The main target groups of the book are IT practitioners and students at graduate or undergraduate level. They will appreciate a concise introduction into the emerging field of risk analysis, supported by a sound methodology, and completed with numerous examples and detailed guidelines. 
650 0 |a Electronic data processing-Management. 
650 0 |a Technological innovations. 
650 0 |a Security systems. 
650 0 |a Data protection. 
650 1 4 |a IT Operations. 
650 2 4 |a Innovation and Technology Management. 
650 2 4 |a Security Science and Technology. 
650 2 4 |a Data and Information Security. 
700 1 |a Solhaug, Bjørnar.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
700 1 |a Stølen, Ketil.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9783642123221 
776 0 8 |i Printed edition:  |z 9783642447013 
776 0 8 |i Printed edition:  |z 9783642123245 
856 4 0 |u https://doi.uam.elogim.com/10.1007/978-3-642-12323-8  |z Texto Completo 
912 |a ZDB-2-SCS 
912 |a ZDB-2-SXCS 
950 |a Computer Science (SpringerNature-11645) 
950 |a Computer Science (R0) (SpringerNature-43710)