Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Information Security Risk Management
biblio
A New Evaluation Model for Information Security Risk Management of SCADA Systems
Submitted by aekwall on Mon, 03/16/2020 - 10:28am
Cyber-physical attacks
Vague Set Theory
vague environment
uncertain environment
structured method
semiquantitative high level analysis
secure SCADA failure modes
RPN
physical layers
Pattern recognition
new evaluation model
FMEA inherent problems
design review
cyber layers
critical information infrastructure
Information Security Risk Management
Safety
Compositionality
SCADA Systems Security
SCADA system
Information systems
process control
failure analysis
risk management
pubcrawl
Human behavior
Resiliency
SCADA systems
SCADA
security
Monitoring
security of data
biblio
Security-Related Stress: A Perspective on Information Security Risk Management
Submitted by aekwall on Mon, 02/17/2020 - 2:28pm
information security
stress inhibitors
security-related stress
security-novice practitioners
novices
ISRM tools
Information Security Risk Management
Security Risk Management
Management
security standards
security of data
Stress
risk management
tools
standards
Compliance
Metrics
pubcrawl
Resiliency
Scalability
biblio
Towards Automation in Information Security Management Systems
Submitted by grigby1 on Tue, 02/06/2018 - 1:54pm
small and medium-sized enterprises
Process Automation
pubcrawl
Resiliency
risk management
Scalability
security controls automation
security of data
security requirements
Metrics
small-to-medium enterprises
Stakeholders
standards
tools
ubiquitous computing
Ubiquitous Computing Security
workflow enactment
information protection
automated process execution
automation
context-aware ISMS
continuous risk-driven ISMS
Data protection
highly interconnected information security management
Human behavior
Human Factors
ADAMANT
information security
Information Security Management System
information security management systems
Information Security Risk Management
Information systems
ISMS related activities
ISO 27001 compliant ISMS