• DocumentCode
    540274
  • Title

    The validity of security risk assessment

  • Author

    Tarr, C.J. ; Kinsman, P.

  • fYear
    1996
  • fDate
    2-4 Oct. 1996
  • Firstpage
    167
  • Lastpage
    170
  • Abstract
    Over the last few years there has been an increasing interest in the application of “risk assessment” to security systems. Many papers have appeared in the literature describing “risk assessment” methods or the results of studies where “risk assessment” principles were applied to a particular security system. Some of those papers define the meaning of risk using a formula relating the consequences of undesirable events and their likelihoods. The formula is then hardly ever used to calculate risk, and the papers rarely describe how its components can be calculated. As a result, there is much confusion about what is involved in security “risk assessment”, and what it can deliver. The paper discusses the implications of the above problem, and provides a fundamental appraisal of the use of risk assessment methods in security. It aims to clarify the current misunderstandings associated with it, and provides guidance on its potential for future applications
  • Keywords
    risk management; safety systems; security; future applications; risk assessment methods; security risk assessment; security systems; undesirable events;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Security Technology, 1996. 30th Annual 1996 International Carnahan Conference
  • Conference_Location
    Lexington, Kentucky, USA
  • Print_ISBN
    0-7803-3537-6
  • Type

    conf

  • DOI
    10.1109/CCST.1996.551858
  • Filename
    5726998