home *** CD-ROM | disk | FTP | other *** search
- Newsgroups: comp.security.misc
- From: amesml@monu1.cc.monash.edu.au (Mark L. Ames)
- Subject: Re: Risk assessment
- Message-ID: <1992Aug11.224923.1913@monu1.cc.monash.edu.au>
- Keywords: References
- Organization: Monash University, Australia.
- Date: Tue, 11 Aug 1992 22:49:23 GMT
-
- Here is a list of Risk assessment references I've acquired during
- some recent work in the area. I'm sure there are lots more:
-
-
- [ArCo87] P. Ardis, M.Comer, Risk Management: Computers, Fraud
- and Insurance, McGraw-Hill, London, 1987.
-
- [BaEl92] K. Badenhorst, J. Eloff, "Information Risk
- Assessment, Risk Analysis and Risk Management: The
- IRR Research Model," Computer Audit Update,
- Elsevier, Feb 1992.
-
- [Bask91] R. Baskerville, "Risk Analysis as a Source of
- Professional Knowledge," Computers and Security,
- Elsevier, Vol 10, 1991, pp. 749-764.
-
- [Buck91] E. R. Buck, III, Introduction to Data Security and
- Controls, QED, Boston, 1991.
-
- [Hert83] Hertz, D., Risk Analysis and its Appplications,
- Wiley, New York, 1983.
-
- [ISO92a] ISO/IECJTC1/SC27/WG1, "WD: Guidelines for the
- Management of IT Security, Part 1: Concepts and
- Models for IT Security.", June, 1992.
-
- [ISO92b] ISO/IECJTC1/SC27/WG1, "WD: Guidelines for the
- Management of IT Security, Part 2: Managing and
- Planning IT Security.", June, 1992.
-
- [ISO92c] ISO/IECJTC1/SC27/WG1, "WD: Guidelines for the
- Management of IT Security, Part 3: Techniques for
- the Management of IT Security.", June, 1992.
-
- [Mads91] W. Madsen, "Data Privacy: Legislation and
- Intelligence Agency Threats," Computer Security and
- Information Integrity, Elsevier, Amsterdam, 1991
- (IFIP/Sec '90 Proceedings).
-
- [Menk92] Menkus, B., "Concerns in Computer Security,"
- Computers & Security, Vol 11, No 3, May 1992.
-
- [NIST92a] Minimum Security Functional Requirements for Multi-
- User Operating Systems, Issue 1 (DRAFT), Computer
- Security Division, Computer Systems Laboratory,
- National Institute of Standards and Technology,
- Gaithersburg, Maryland, January 1992.
-
- [Ozie92] W. Ozier, "Risk Assessment and Management," in
- Data Security Management, Auerbach, 1992.
-
- [Wong92] K. Wong, "Meeting the Business Challenge of the
- 90's," Computer Fraud & Security Bulletin, Elsevier,
- June 1992.
-
-