Smoking Out the Bad Actors: Risk Analysis in the Age of the Microcomputer

Risk analysis involves both risk assessment and risk management. Applied to data processing, risk assessment is a method of estimating exposure of computer resources to loss. Risk management attempts to select a set of safeguards to maximize exposure reduction while staying within real-world constra...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Computers & security 1989-06, Vol.8 (4), p.299
1. Verfasser: Hoffman, Lance J
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue 4
container_start_page 299
container_title Computers & security
container_volume 8
creator Hoffman, Lance J
description Risk analysis involves both risk assessment and risk management. Applied to data processing, risk assessment is a method of estimating exposure of computer resources to loss. Risk management attempts to select a set of safeguards to maximize exposure reduction while staying within real-world constraints. A prototype system for risk analysis is presented that identifies "bad actors" and suggests which items to change first, independent of the underlying model. Generally, managers have used sensitivity analysis to decide which safeguards to implement. The proposed goal-seeking program eliminates the need for a human to do the sensitivity analysis arithmetic or to suffer the tedium of trial and error. The program asks users which dependent variable they wish to minimize or maximize and then proceeds to vary all of the independent variables, keeping track of which most influence the variable of interest. The program reports the results when it has tried all cases. The program runs on an IBM PC, and it accepts variables in the RiskCalc external file format.
format Article
fullrecord <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_journals_207372849</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1042485</sourcerecordid><originalsourceid>FETCH-proquest_journals_2073728493</originalsourceid><addsrcrecordid>eNqNjEsKwjAUAIMoWD93eLgvpGlporsqii5EUPel1LSmv9S8ZOHtleIBXM0shhkRLxCc-TGjYkw8GsTcj2gkpmSGWFEa8FgIj5xura5VV8LFWbBPCdvsAUlutcENXBXWkHRZ80aFoLohSEoJuhj0rHKjc932zkqzIJMia1Auf5yT1WF_3x393uiXk2jTSjvznWHKKA85E9E6_Cv6AGNWPA0</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>207372849</pqid></control><display><type>article</type><title>Smoking Out the Bad Actors: Risk Analysis in the Age of the Microcomputer</title><source>Elsevier ScienceDirect Journals</source><creator>Hoffman, Lance J</creator><creatorcontrib>Hoffman, Lance J</creatorcontrib><description>Risk analysis involves both risk assessment and risk management. Applied to data processing, risk assessment is a method of estimating exposure of computer resources to loss. Risk management attempts to select a set of safeguards to maximize exposure reduction while staying within real-world constraints. A prototype system for risk analysis is presented that identifies "bad actors" and suggests which items to change first, independent of the underlying model. Generally, managers have used sensitivity analysis to decide which safeguards to implement. The proposed goal-seeking program eliminates the need for a human to do the sensitivity analysis arithmetic or to suffer the tedium of trial and error. The program asks users which dependent variable they wish to minimize or maximize and then proceeds to vary all of the independent variables, keeping track of which most influence the variable of interest. The program reports the results when it has tried all cases. The program runs on an IBM PC, and it accepts variables in the RiskCalc external file format.</description><identifier>ISSN: 0167-4048</identifier><identifier>EISSN: 1872-6208</identifier><identifier>CODEN: CPSEDU</identifier><language>eng</language><publisher>Amsterdam: Elsevier Sequoia S.A</publisher><subject>Cybersecurity ; Personal computers ; Prototypes ; Risk assessment ; Risk management ; Sensitivity analysis</subject><ispartof>Computers &amp; security, 1989-06, Vol.8 (4), p.299</ispartof><rights>Copyright Elsevier Sequoia S.A. Jun 1989</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780</link.rule.ids></links><search><creatorcontrib>Hoffman, Lance J</creatorcontrib><title>Smoking Out the Bad Actors: Risk Analysis in the Age of the Microcomputer</title><title>Computers &amp; security</title><description>Risk analysis involves both risk assessment and risk management. Applied to data processing, risk assessment is a method of estimating exposure of computer resources to loss. Risk management attempts to select a set of safeguards to maximize exposure reduction while staying within real-world constraints. A prototype system for risk analysis is presented that identifies "bad actors" and suggests which items to change first, independent of the underlying model. Generally, managers have used sensitivity analysis to decide which safeguards to implement. The proposed goal-seeking program eliminates the need for a human to do the sensitivity analysis arithmetic or to suffer the tedium of trial and error. The program asks users which dependent variable they wish to minimize or maximize and then proceeds to vary all of the independent variables, keeping track of which most influence the variable of interest. The program reports the results when it has tried all cases. The program runs on an IBM PC, and it accepts variables in the RiskCalc external file format.</description><subject>Cybersecurity</subject><subject>Personal computers</subject><subject>Prototypes</subject><subject>Risk assessment</subject><subject>Risk management</subject><subject>Sensitivity analysis</subject><issn>0167-4048</issn><issn>1872-6208</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>1989</creationdate><recordtype>article</recordtype><recordid>eNqNjEsKwjAUAIMoWD93eLgvpGlporsqii5EUPel1LSmv9S8ZOHtleIBXM0shhkRLxCc-TGjYkw8GsTcj2gkpmSGWFEa8FgIj5xura5VV8LFWbBPCdvsAUlutcENXBXWkHRZ80aFoLohSEoJuhj0rHKjc932zkqzIJMia1Auf5yT1WF_3x393uiXk2jTSjvznWHKKA85E9E6_Cv6AGNWPA0</recordid><startdate>19890601</startdate><enddate>19890601</enddate><creator>Hoffman, Lance J</creator><general>Elsevier Sequoia S.A</general><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>K7.</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>19890601</creationdate><title>Smoking Out the Bad Actors: Risk Analysis in the Age of the Microcomputer</title><author>Hoffman, Lance J</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-proquest_journals_2073728493</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>1989</creationdate><topic>Cybersecurity</topic><topic>Personal computers</topic><topic>Prototypes</topic><topic>Risk assessment</topic><topic>Risk management</topic><topic>Sensitivity analysis</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Hoffman, Lance J</creatorcontrib><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Criminal Justice (Alumni)</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Computers &amp; security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Hoffman, Lance J</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Smoking Out the Bad Actors: Risk Analysis in the Age of the Microcomputer</atitle><jtitle>Computers &amp; security</jtitle><date>1989-06-01</date><risdate>1989</risdate><volume>8</volume><issue>4</issue><spage>299</spage><pages>299-</pages><issn>0167-4048</issn><eissn>1872-6208</eissn><coden>CPSEDU</coden><abstract>Risk analysis involves both risk assessment and risk management. Applied to data processing, risk assessment is a method of estimating exposure of computer resources to loss. Risk management attempts to select a set of safeguards to maximize exposure reduction while staying within real-world constraints. A prototype system for risk analysis is presented that identifies "bad actors" and suggests which items to change first, independent of the underlying model. Generally, managers have used sensitivity analysis to decide which safeguards to implement. The proposed goal-seeking program eliminates the need for a human to do the sensitivity analysis arithmetic or to suffer the tedium of trial and error. The program asks users which dependent variable they wish to minimize or maximize and then proceeds to vary all of the independent variables, keeping track of which most influence the variable of interest. The program reports the results when it has tried all cases. The program runs on an IBM PC, and it accepts variables in the RiskCalc external file format.</abstract><cop>Amsterdam</cop><pub>Elsevier Sequoia S.A</pub></addata></record>
fulltext fulltext
identifier ISSN: 0167-4048
ispartof Computers & security, 1989-06, Vol.8 (4), p.299
issn 0167-4048
1872-6208
language eng
recordid cdi_proquest_journals_207372849
source Elsevier ScienceDirect Journals
subjects Cybersecurity
Personal computers
Prototypes
Risk assessment
Risk management
Sensitivity analysis
title Smoking Out the Bad Actors: Risk Analysis in the Age of the Microcomputer
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-25T15%3A22%3A23IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Smoking%20Out%20the%20Bad%20Actors:%20Risk%20Analysis%20in%20the%20Age%20of%20the%20Microcomputer&rft.jtitle=Computers%20&%20security&rft.au=Hoffman,%20Lance%20J&rft.date=1989-06-01&rft.volume=8&rft.issue=4&rft.spage=299&rft.pages=299-&rft.issn=0167-4048&rft.eissn=1872-6208&rft.coden=CPSEDU&rft_id=info:doi/&rft_dat=%3Cproquest%3E1042485%3C/proquest%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=207372849&rft_id=info:pmid/&rfr_iscdi=true