Title :
Verification, Validation, and Evaluation in Information Security Risk Management
Author :
Fenz, Stefan ; Ekelhart, Andreas
Author_Institution :
Vienna Univ. of Technol., Vienna, Austria
Abstract :
By surveying verification, validation, and evaluation methods referenced in information security risk management (ISRM) literature, the authors discuss in which ISRM phases particular methods should be applied and demonstrate appropriate methods with a real-world example.
Keywords :
formal verification; risk management; security of data; ISRM phases; evaluation method; information security risk management; validation method; verification method; Costs; Information security; Information technology; Interactive systems; NIST; Privacy; Protection; Risk management; Technology management; review and evaluation; risk management; security and protection;
Journal_Title :
Security & Privacy, IEEE
DOI :
10.1109/MSP.2010.117