DocumentCode :
540274
Title :
The validity of security risk assessment
Author :
Tarr, C.J. ; Kinsman, P.
fYear :
1996
fDate :
2-4 Oct. 1996
Firstpage :
167
Lastpage :
170
Abstract :
Over the last few years there has been an increasing interest in the application of “risk assessment” to security systems. Many papers have appeared in the literature describing “risk assessment” methods or the results of studies where “risk assessment” principles were applied to a particular security system. Some of those papers define the meaning of risk using a formula relating the consequences of undesirable events and their likelihoods. The formula is then hardly ever used to calculate risk, and the papers rarely describe how its components can be calculated. As a result, there is much confusion about what is involved in security “risk assessment”, and what it can deliver. The paper discusses the implications of the above problem, and provides a fundamental appraisal of the use of risk assessment methods in security. It aims to clarify the current misunderstandings associated with it, and provides guidance on its potential for future applications
Keywords :
risk management; safety systems; security; future applications; risk assessment methods; security risk assessment; security systems; undesirable events;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Security Technology, 1996. 30th Annual 1996 International Carnahan Conference
Conference_Location :
Lexington, Kentucky, USA
Print_ISBN :
0-7803-3537-6
Type :
conf
DOI :
10.1109/CCST.1996.551858
Filename :
5726998
Link To Document :
بازگشت