Verification, Validation, and Evaluation in Information Security Risk Management

被引:25
作者
Fenz, Stefan [1 ]
Ekelhart, Andreas [1 ]
机构
[1] Vienna Univ Technol, Vienna, Austria
关键词
Information security; Risk management; Protection; Costs; Information technology; NIST; Face; Interactive systems; Privacy; Technology management; security and protection; risk management; review and evaluation; SYSTEMS SECURITY; MODEL;
D O I
10.1109/MSP.2010.117
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Over the past four decades, various information security risk management (ISRM) approaches have emerged. However, there is a lack of sound verification, validation, and evaluation methods for these approaches. Although restrictions, such as the impossibility of measuring exact values for probabilities and follow-up costs, obviously exist, verification, validation, and evaluation of research is essential in any field, and ISRM is no exception. So far, there is no systematic overview of the available methods. In this article, the authors survey verification, validation, and evaluation methods referenced in ISRM literature and discuss which ISRM phase to apply the methods. They then demonstrate how to select appropriate methods with a real-world example. This systematic analysis draws conclusions on the current status of ISRM verification, validation, and evaluation and can serve as a reference for ISRM researchers and users who aim to establish trust in their results. © 2011 IEEE.
引用
收藏
页码:58 / 65
页数:8
相关论文
共 17 条
[1]  
[Anonymous], 2003, J INFORM TECHNOLOGY
[2]   Is information security under control? Investigating quality in information security management [J].
Baker, Wade H. ;
Wallace, Linda .
IEEE SECURITY & PRIVACY, 2007, 5 (01) :36-44
[3]  
Baskerville R., 1991, Computers & Security, V10, P749, DOI 10.1016/0167-4048(91)90094-T
[4]  
Benaroch M, 2006, MIS QUART, V30, P827
[5]   Information security and risk management [J].
Bodin, Lawrence D. ;
Gordon, Lawrence A. ;
Loeb, Martin P. .
COMMUNICATIONS OF THE ACM, 2008, 51 (04) :64-68
[6]   A model for evaluating IT security investments [J].
Cavusoglu, H ;
Mishra, B ;
Raghunathan, S .
COMMUNICATIONS OF THE ACM, 2004, 47 (07) :87-92
[7]   Why Johnny can't evaluate security risk [J].
Cybenko, G .
IEEE SECURITY & PRIVACY, 2006, 4 (01) :5-5
[8]  
Feather MS, 2005, COMPUT SYST SCI ENG, V20, P5
[9]   Understanding the value of countermeasure portfolios in information systems security [J].
Kumar, Ram L. ;
Park, Sungjune ;
Subramaniam, Chandrasekar .
JOURNAL OF MANAGEMENT INFORMATION SYSTEMS, 2008, 25 (02) :241-279
[10]   Security meter: A practical decision-tree model to quantify risk [J].
Sahinoglu, M .
IEEE SECURITY & PRIVACY, 2005, 3 (03) :18-24