3. Alternative approaches to risk mapping
This section presents other approaches to risk analysis and management. These are also risk maps, but not only represented according to the frequency-cost approach.
3.1 SSI mapping – Threats and vulnerabilities
Risk mapping in the field of information systems security can also be represented using the frequency-cost approach. However, the methodological approaches widely used in this field represent IT security risks in different ways, which are complementary.
Table 3 illustrates this approach, which can be found in the EBIOS Risk Manager method (recommended by the French National Agency for Information Systems Security), which aims to represent information systems security...
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!
Alternative approaches to risk mapping
Article included in this offer
"Security of information systems"
(
86 articles
)
Updated and enriched with articles validated by our scientific committees
A set of exclusive tools to complement the resources
Bibliography
Bibliography
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!