Foundations of Risk Analysis
2008-2009
-
IMT4771
- 5sp
Forventet læringsutbytte
After the course the students should have:
- advanced level of understanding of assumptions and models on which risk analysis methods are based.
- deep understanding of how different assumptions/models influence outcomes of different risk analysis methods
Emnets temaer
1. Adversary models
2. Uncertainty
3. Game theory
4. Methods for risk assessment
Pedagogiske metoder
Forelesninger
Oppgaveløsning
Vurderingsformer
Annet
Vurderingsformer
- Written exam (alternatively oral exam): 51%
- Projects: 49%.
- Both parts must be passed.
Karakterskala
Bokstavkarakterer, A (best) - F (ikke bestått)
Sensorordning
Evaluated by external examiner.
Utsatt eksamen (tidl. kontinuasjon)
The whole subject must be repeated.
Tillatte hjelpemidler (gjelder kun skriftlig eksamen)
Approved calculator
Obligatoriske arbeidskrav
None
Læremidler
Books:
Selected chapters from the following or similar books:
[1] Douglas J. Landoll. The security Risk Assessment Handbook. Auerbach Publications,
2006.
[2] Joseph Y. Halpern. Reasoning about uncertainty. The MIT Press, 2005.
[3] Drew Fudenberg and Jean Tirole. Game Theory. The MIT Press, 1991.
[4] Terje Aven. Foundations of Risk Analysis. Wiley, 2003.
[5] Tim Bedford and Roger Cooke. Probabilistic Risk Analysis - Foundations and methods. Cambridge University Press, 2006
Selected articles, e.g a subset of
[6] J. A. Adams. 'Richter scale for risk'? Scientifiic management of uncertainty versus
management of scientificc uncertainty. Interdiscip Sci Rev, 23:146-155, 1998.
[7] Ross Anderson and Tyler Moore. The economics of information security. Science, pages 610-613, October 2006.
[8] D. J. Bodeau. A conceptual model for computer security risk analysis. In Proceedings
of the Eighth Annual Computer Security Applications Conference, pages 56-63, San Antonio, TX, USA, 1992. IEEE Press
[9] H. Campbell. Risk assessment: subjective or objective? Engineering science and education journal, 7:57 -63, 1998.
[10] Philip L. Campbell and Jason E. Stamp. A classification scheme for risk assessment methods. Technical Report SAND2004-4233, Sandia National Laboratories1, 2004
[11] Lawrence A. Gordon and Martin P. Loeb. The economics of information security
investment. ACM Trans. Inf. Syst. Secur., 5(4):438-457, 2002.
[12] Yacov Y. Haimes. Total risk management. Risk Analysis, 11(2), 1991.
[13] Kjell Hausken. Probabilistic risk analysis and game theory. Risk Analysis, 22(1):17-27, 2002.
[14] Peng Liu, Wanyu Zang, and Meng Yu. Incentive-based modeling and inference of
attacker intent, objectives, and strategies. ACM Trans. Inf. Syst. Secur., 8(1):78-118,
2005.
[15] Yu Liu, Cristina Comaniciu, and Hong Man. A bayesian game approach for intrusion
detection in wireless ad hoc networks. In GameNets '06: Proceeding from the 2006
workshop on Game theory for communications and networks, page 4, New York, NY,
USA, 2006. ACM Press.
[16] Kong-wei Lye and Jeanette Wing. Game strategies in network security. Technical
Report CMU-CS-02-136, School of computer Science, Carnegie Mellon University,
2002.
[17] NIST. Draft special publication 800-53a, guide for assessing the security controls in
federal information systems, 2006.
[18] Felix Redmill. Risk analysis - a subjective process. Engineering Management Journal
(IEE), 12(2), April 2002.
[19] Emily M. Smith. Designing for sabotage. Mechanical engineering online, september 2002.
Supplerende opplysninger
There is room for 50 students for the course.