Risk Reduction Overview A Visualization Method for Risk Management

被引:0
作者
Havinga, Hellen Nanda Janine [1 ]
Sessink, Olivier Diederik Theobald [2 ]
机构
[1] Rijkswaterstaat, Cent Informat Serv, Delft, Netherlands
[2] Ministry Defense, The Hague, Netherlands
来源
AVAILABILITY, RELIABILITY, AND SECURITY IN INFORMATION SYSTEMS | 2014年 / 8708卷
关键词
Design; Security; Residual risk; Risk management; Security measure; Visualization;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Risk Reduction Overview (RRO) method presents a comprehensible overview of the coherence of risks, measures and residual risks. The method is designed to support communication between different stakeholders in complex risk management. Seven reasons are addressed why risk management in IT security has many uncertainties and fast changing factors, four for IT security in general and three for large organizations specifically. The RRO visualization has been proven valuable to discuss, optimize, evaluate, and audit a design or a change in a complex environment. The method has been used, evaluated, and improved over the last six years in large government and military organizations. Seven areas in design and decision making are identified in which a RRO is found to be beneficial. Despite the widely accepted need for risk management we believe this is the first practical method that delivers a comprehensive overview that improves communication between different stakeholders.
引用
收藏
页码:239 / +
页数:3
相关论文
共 14 条
  • [1] Acquisti A., 2006, P INT C INFORM SYSTE
  • [2] [Anonymous], 2010, NIST SPECIAL PUBLICA, V800-22
  • [3] ARORA A, 2004, OUNCE PREVENTION VS
  • [4] Berinato S., 2002, CIO MAGAZINE 0215, P43
  • [5] Bornman G., 2004, P INF SEC S AFR C IS
  • [6] Quantifying the financial impact of IT security breaches
    Garg, Ashish
    Curtis, Jeffrey
    Halper, Hilary
    [J]. Information Management and Computer Security, 2003, 11 (2-3): : 74 - 83
  • [7] Gordon L. A., 2002, ACM Transactions on Information and Systems Security, V5, P438, DOI 10.1145/581271.581274
  • [8] Joint Technical Committee, 2011, 1SC27 ISOIEC JTC
  • [9] Are we forgetting the risks of information technology?
    Longstaff, TA
    Chittister, C
    Pethia, R
    Haimes, YY
    [J]. COMPUTER, 2000, 33 (12) : 43 - +
  • [10] Managing vulnerabilities in networked systems
    Martin, RA
    [J]. COMPUTER, 2001, 34 (11) : 32 - +