Developing Cost And Risk Assessment Tool For Hybrid Approach In Information Security Risk Analysis
Identifying potential information security risk is a challenging task which is due to modernization and new technologies which introduce possible threats to various type of digital system. Many studies proved that the current risk analysis tools are not able to analyze the threats well. It is a must...
| Main Author: | Mohd Zabawi, Ahmed Yaser |
|---|---|
| Format: | Thesis |
| Language: | English English |
| Published: |
2019
|
| Subjects: | |
| Online Access: | http://eprints.utem.edu.my/id/eprint/24697/ https://plh.utem.edu.my/cgi-bin/koha/opac-detail.pl?biblionumber=116960 |
| Abstract | Abstract here |
Similar Items
Information security risk management framework for Social Engineering attack and digital prevention techniques
by: Shekh Abdullah -Al-Musa Ahmed
Published: (2020)
by: Shekh Abdullah -Al-Musa Ahmed
Published: (2020)
Evaluation of Information Security Risks of E-Learning Systems: A Case Study on UUM Learning Zone
by: Tan, Wai Beng
Published: (2011)
by: Tan, Wai Beng
Published: (2011)
Software risk management tool : the statistical manager / Siah Guat Choon
by: Siah, Guat Choon
Published: (1999)
by: Siah, Guat Choon
Published: (1999)
An enhanced risk identification and assessment model to improve software risk management / Ahdieh Sadat Khatavakhotan
by: Ahdieh Sadat, Khatavakhotan
Published: (2017)
by: Ahdieh Sadat, Khatavakhotan
Published: (2017)
Development of SecureMet: A Tool for Aligning Security Metrics and Organizations Security Objectives
by: Noraini, Mohd Noor
Published: (2011)
by: Noraini, Mohd Noor
Published: (2011)
Tool-assisted model for software requirement negotiation
by: Lau, Hong Sheng
Published: (2015)
by: Lau, Hong Sheng
Published: (2015)
A secure message handler using microsoft cryptoapi
by: Eh Kan, Chessda Uttraphan
Published: (2003)
by: Eh Kan, Chessda Uttraphan
Published: (2003)
Web transcript verification using dual check digit as secure number
by: Abd Halim, Muhamad Rais
Published: (2016)
by: Abd Halim, Muhamad Rais
Published: (2016)
Developing secure android application with encrypted database file using sqlcipher
by: Rachmawan, Ardiansa
Published: (2014)
by: Rachmawan, Ardiansa
Published: (2014)
Unified framework for spam detection and risk assessment in short message communication media / Adewole Kayode Sakariyah
by: Adewole Kayode, Sakariyah
Published: (2018)
by: Adewole Kayode, Sakariyah
Published: (2018)
An efficient multi join query optimization for relational database management system using swarm intelligence approaches
by: Alsaedi, Ahmed Khalaf Zager
Published: (2016)
by: Alsaedi, Ahmed Khalaf Zager
Published: (2016)
An efficient multi join query optimization for relational database management system using swarm intelligence approaches
by: Alsaedi, Ahmed Khalaf Zager
Published: (2016)
by: Alsaedi, Ahmed Khalaf Zager
Published: (2016)
A hybrid model for discovering significant patterns in data mining
by: Abdullah, Zailani
Published: (2012)
by: Abdullah, Zailani
Published: (2012)
ACIS : a tool for asynchronous collaborative information sharing / Hadzariah Ismail.
by: Ismail, Hadzariah
Published: (2003)
by: Ismail, Hadzariah
Published: (2003)
Development of implementation models for Hospital information system (HIS) in Malaysian Public Hospitals
by: Ismail, Nurul Izzatty
Published: (2016)
by: Ismail, Nurul Izzatty
Published: (2016)
Dyscreen : cross-platform dyslexia screening test for Malaysian children through hybrid applications
by: Leong, Pui Huang
Published: (2015)
by: Leong, Pui Huang
Published: (2015)
Logical approach : consistency rules between activity diagram and class diagram
by: Sulaiman, Noraini
Published: (2015)
by: Sulaiman, Noraini
Published: (2015)
Real estate recommender systems using case-base reasoning approach
by: Alrawhani, Ebrahim Mohammed Abdo
Published: (2014)
by: Alrawhani, Ebrahim Mohammed Abdo
Published: (2014)
An investigation of health information system security policies compliance behaviour / Norshima Humaidi
by: Norshima, Humaidi
Published: (2016)
by: Norshima, Humaidi
Published: (2016)
Softrisk : prototype for software risk management / Ayad Ali Kashlaf.
by: Kashlaf, Ayad Ali
Published: (1999)
by: Kashlaf, Ayad Ali
Published: (1999)
Specification of vertical semantic consistency rules of UML class diagram refinement using logical approach
by: Nuraini Abdulganiyyi, Nuraini
Published: (2014)
by: Nuraini Abdulganiyyi, Nuraini
Published: (2014)
Simulation on Network Security Design Architecture for Server Room in Rwanda Information Technology Agency
by: Eric, Karerangabo
Published: (2009)
by: Eric, Karerangabo
Published: (2009)
A case tool for UML via meta-modeling approach / Rosnafisah binti Sulaiman.
by: Sulaiman, Rosnafisah
Published: (1999)
by: Sulaiman, Rosnafisah
Published: (1999)
Analysis of Linguistic Steganography Tools
by: Shaifizat, Mansor
Published: (2004)
by: Shaifizat, Mansor
Published: (2004)
A Weighted-Based Approach To Prioritize User Preferences In Information Retrieval
by: Al-Qudah, Mashal Kasem
Published: (2008)
by: Al-Qudah, Mashal Kasem
Published: (2008)
Comparative analysis between FPA and COCOMO techniques for software cost estimation
by: Ali Moftah, Abu Baker
Published: (2014)
by: Ali Moftah, Abu Baker
Published: (2014)
Test suite reduction in android application using refactoring
by: Ahmed, Maryam Temitayo
Published: (2016)
by: Ahmed, Maryam Temitayo
Published: (2016)
A hybrid approach for reverse engineering gui model from mobile apps for automated testing
by: Anka, Salihu Ibrahim
Published: (2017)
by: Anka, Salihu Ibrahim
Published: (2017)
Testing model using risk poker technique for scrum-based software development projects / Siti Noor Hasanah Ghazali
by: Siti Noor Hasanah , Ghazali
Published: (2017)
by: Siti Noor Hasanah , Ghazali
Published: (2017)
An enhanced concept based approach medical information retrieval to address readability, vocabulary and presentation issues
by: Kontagora, Ibrahim Umar
Published: (2019)
by: Kontagora, Ibrahim Umar
Published: (2019)
Multiple Choice Questions Test Scoring And Item Analysis Tool
by: Mohamad Zamberi, Saad
Published: (1995)
by: Mohamad Zamberi, Saad
Published: (1995)
Uncovering Hidden Information Within R&D Department's Ticket Using Data Mining Clustering Approach
by: Azmi, Abu Bakar
Published: (2011)
by: Azmi, Abu Bakar
Published: (2011)
Computational intelligence approach for classification and risk quantification of metabolic syndrome / Habeebah Adamu Kakudi
by: Habeebah Adamu , Kakudi
Published: (2019)
by: Habeebah Adamu , Kakudi
Published: (2019)
Analysis and modeling of database storage optimization power consumption usage for green data centers
by: Wan Noor Hamiza, Wan Ali
Published: (2014)
by: Wan Noor Hamiza, Wan Ali
Published: (2014)
Perspective on selected sample on SDL in JAVA-an analysis of a learning module design for pre-evaluation purposes
by: Ibrahim, Zakir Hussain
Published: (2001)
by: Ibrahim, Zakir Hussain
Published: (2001)
GRAT : groupware supported requirements analysis tool / Veleswaran a/l Nallaiah.
by: Nallaiah, Veleswaran
Published: (2004)
by: Nallaiah, Veleswaran
Published: (2004)
Development of Design-Oriented Evaluation Tool : A HCI Perspective
by: Suganthi Naikkar, Subramaniam
Published: (2004)
by: Suganthi Naikkar, Subramaniam
Published: (2004)
Development of cost effective PLC training kit by using arduino platform (PLCDUINO)
by: Mohd Samsudin, Mohd Safit
Published: (2015)
by: Mohd Samsudin, Mohd Safit
Published: (2015)
Development Of The Readability Index Model For Young Adults With Reading Difficulties In Malay Language
by: Mohamad Hazawawi, Nur Amalina
Published: (2019)
by: Mohamad Hazawawi, Nur Amalina
Published: (2019)
User Acceptance Of Mobile Augmented Reality For Tourism By Adopting The UTAUT Model
by: Low, Wei Shang
Published: (2019)
by: Low, Wei Shang
Published: (2019)
Similar Items
-
Information security risk management framework for Social Engineering attack and digital prevention techniques
by: Shekh Abdullah -Al-Musa Ahmed
Published: (2020) -
Evaluation of Information Security Risks of E-Learning Systems: A Case Study on UUM Learning Zone
by: Tan, Wai Beng
Published: (2011) -
Software risk management tool : the statistical manager / Siah Guat Choon
by: Siah, Guat Choon
Published: (1999) -
An enhanced risk identification and assessment model to improve software risk management / Ahdieh Sadat Khatavakhotan
by: Ahdieh Sadat, Khatavakhotan
Published: (2017) -
Development of SecureMet: A Tool for Aligning Security Metrics and Organizations Security Objectives
by: Noraini, Mohd Noor
Published: (2011)
