Abstract
In this chapter, we explain the importance of risk analysis in general. The asset-driven and model-based approach of CORAS is explained and motivated, and the overall aims of the book are given. The chapter furthermore gives a structural overview of the book, including its decomposition into parts and chapters and how these are related.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
CORAS is the name of our approach, and is written in capital letters; it is not, and has never been, an acronym.
References
Baker, W.H., Hylender, C.D., Valentine, J.A.: 2008 data breach investigations report. A study conducted by the Verizon business risk team, Verizon (2008)
Computer Security Institute: 2008 CSI Computer Crime and Security Survey (2008)
Computer Security Institute: 2009 CSI Computer Crime and Security Survey (2009)
Department for Business, Enterprise & Regulatory Reform: 2008 Information Security Breaches Survey (2008)
International Organization for Standardization: ISO 31000 Risk management – Principles and guidelines (2009)
Poulsen, K.: Slammer worm crashed Ohio nuke plant network. SecurityFocus (2003)
Poulsen, K.: Sluggish movement on power grid cyber security. SecurityFocus (2004)
PriceWaterhouseCoopers: The global state of information security 2010 (2009)
SOPHOS: Security threat report: 2010 (2010)
Standards Australia/Standards New Zealand: AS/NZS 4360 Risk Management (2004)
Symantec: Symantec global internet security threat report – trends for 2008 (2009)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Lund, M.S., Solhaug, B., Stølen, K. (2011). Introduction. In: Model-Driven Risk Analysis. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-12323-8_1
Download citation
DOI: https://doi.org/10.1007/978-3-642-12323-8_1
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-12322-1
Online ISBN: 978-3-642-12323-8
eBook Packages: Computer ScienceComputer Science (R0)