[1]
Information Security Forum (ISF). Tools and methodologies, available at: https: /www. securityforum. org/tools/#anchor5tpsat, accessed: 12. 02. (2015).
Google Scholar
[2]
E. Zambon, S. Etalle, R. J. Wieringa, P. Hartel, Model-based qualitative risk assessment for availability of it infrastructures. Softw. Syst. Model. 10, 4 (2011) 553–580.
DOI: 10.1007/s10270-010-0166-8
Google Scholar
[3]
Wikipedia, ISO/IEC 27002, available at: http: /en. wikipedia. org/wiki/ISO/IEC_27002, accessed: 11. 02. (2015).
DOI: 10.3403/30310928
Google Scholar
[4]
NIST Special Publication 800-30 Revision 1, Information Security - Guide for Conducting Risk Assessments, available at: http: /csrc. nist. gov/publications/nistpubs/800-30-rev1/sp800_30_r1. pdf, accessed: 21. 12. (2014).
Google Scholar
[5]
http: /www. riscomatic. com/blog/wp-content/uploads/2014/07/ISO-27005-Risk-Management-Flowchart. png, accessed: 12. 02. (2015).
Google Scholar
[6]
D. Ionita, Current Established Risk Assessment Methodologies and Tools – Master Thesis - Faculty of Electrical Engineering, Mathematics and Computer Science (EEMCS) Department of Computer Science - Information Systems group – Universiteit Twente, (2013).
Google Scholar
[7]
https: /www. clusif. asso. fr/en/production/mehari/#vulnerabilities, accessed: 12. 02. (2015).
Google Scholar
[8]
G. Bornman, L. Labuschagne, A comparative framework for evaluating information security risk management methods, in Proceedings of the Information Security South Africa Conference, 2004, pp.7-14.
Google Scholar
[9]
C. Alberts, A. Dorofee, Managing Information Security Risks: The OCTAVE Approach. Boston, MA: Addison-Wesley, (2002).
Google Scholar
[10]
Cert Coordination Center, The OCTAVE approach, 2003, available at: http: /www. cert. org/, accessed: 21. 12. (2014).
Google Scholar
[11]
C. Alberts, A. Dorofee, J. Stevens, Carol Woody, Introduction to the OCTAVE. Approach, Pittsburgh, PA 15213-3890, (2003).
DOI: 10.21236/ada634134
Google Scholar
[12]
A. Behnia, R. A. Rashid, J. A. Chaudhry. A survey of information security risk analysis methods. Smart Computing Review. 2, 1 (2012) 79-94.
Google Scholar
[13]
Kiyoshi Nagata, Construction of Effective Database System for Information Risk Mitigation, Security Enhanced Applications for Information Systems, Dr. Christos Kalloniatis (Ed. ), InTech, 2012, available from: http: /www. intechopen. com/books/security-enhanced-applications-for-informationsystems/construction-of-effective-database-system-for-information-risk-mitigation, accessed: 26. 03. (2015).
DOI: 10.5772/38492
Google Scholar
[14]
F. Fechete, A. Nedelcu, Risk assessment affecting organization performance, Advances in Economics, Law and Political Sciences, University of Braşov, (2014).
Google Scholar