Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Risk analysis review
Linköping University, Department of Computer and Information Science. Linköping University, Faculty of Science & Engineering.
Linköping University, Department of Computer and Information Science. Linköping University, Faculty of Science & Engineering.
2015 (English)Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
Abstract [en]

The risk analysis process is the foundation of creating secure systems. An accurate and well defined risk analysis will therefore be a big help for any company, indicating what resources are needed and where they should be put to use. It can be difficult to know which risk analysis methodology to use given a set of parameters such as available resources, time, money etc. In this review we will introduce several different risk analysis methodologies and classify them using our risk analysis classification system. Our classification points out some of the pros and cons for each method, making it easier to choose the one best suited for a specific scenario. We will also connect the presented methods with real-world usage of said methods. To do this we have conducted interviews with IT-security experts at several major companies and we will present previous documented usage of risk analysis methods. Larger companies tend to develop their own methods for risk analysis, and smaller companies that do not have enough time or resources to develop their own methods are more likely to use already existing methods. With that said we believe that anyone that works with risk analysis could have use of our review.

Place, publisher, year, edition, pages
2015. , 36 p.
Keyword [en]
Risk analysis
National Category
Computer Science
Identifiers
URN: urn:nbn:se:liu:diva-119379ISRN: LIU-IDA/LITH-EX-G--15/046--SEOAI: oai:DiVA.org:liu-119379DiVA: diva2:821842
Subject / course
Computer science
Supervisors
Examiners
Available from: 2015-06-17 Created: 2015-06-15 Last updated: 2015-06-17Bibliographically approved

Open Access in DiVA

Risk analysis review(845 kB)229 downloads
File information
File name FULLTEXT01.pdfFile size 845 kBChecksum SHA-512
8024cf17d13650210cf032e17ddcb527e9ab4d5a1d1f71a2a48d3ab714a49c6391cd2ce84117e15f91e9c99367af810a274662034b1d239d1f2b7267ef98cdfd
Type fulltextMimetype application/pdf

Search in DiVA

By author/editor
Bergvall, JacobSvensson, Louise
By organisation
Department of Computer and Information ScienceFaculty of Science & Engineering
Computer Science

Search outside of DiVA

GoogleGoogle Scholar
Total: 229 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

urn-nbn

Altmetric score

urn-nbn
Total: 665 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf