Search results

1 – 3 of 3
Per page
102050
Citations:
Loading...
Available. Content available
Article
Publication date: 1 June 2005

Donald R. Moscato

155

Abstract

Details

Benchmarking: An International Journal, vol. 12 no. 3
Type: Research Article
ISSN: 1463-5771

Keywords

Available. Content available
204

Abstract

Details

Benchmarking: An International Journal, vol. 13 no. 6
Type: Research Article
ISSN: 1463-5771

Keywords

Access Restricted. View access options
Article
Publication date: 1 August 1998

Donald R. Moscato

Many large organizations maintain a significant amount of their data in what are currently referred to as legacy systems. In order to provide end users access to the firm’s legacy…

513

Abstract

Many large organizations maintain a significant amount of their data in what are currently referred to as legacy systems. In order to provide end users access to the firm’s legacy applications many organizations have opted to provide what is referred to as a database gateway system. An organization must be able to calculate its exposure in the event of a disaster occurring. Performance, recovery and monitoring considerations of the database gateway system have to be included in the risk analysis. The traditional approach to performing a risk analysis adheres to the procedure: identify the exposures or threats to the system; identify the assets at risk; determine the probability of the exposures happening; compute the expected loss for each asset and threat; consider the impact of existing controls; run a high/low analysis to determine the domain of risk exposure. Explains, in non‐technical terms, the basic concepts of the application of fuzzy logic modelling to risk analysis.

Details

Information Management & Computer Security, vol. 6 no. 3
Type: Research Article
ISSN: 0968-5227

Keywords

1 – 3 of 3
Per page
102050