Implementing a risk management approach for optimizing information security systems

被引:0
作者
Petrescu, Marius [1 ]
Stegaroiu, Ion [1 ]
Braboveanu, Mioara [1 ]
Petrescu, Anca-Gabriela [1 ]
Sirbu, Nicoleta [1 ]
机构
[1] Valahia Univ Targoviste, Targoviste, Romania
来源
BUSINESS TRANSFORMATION THROUGH INNOVATION AND KNOWLEDGE MANAGEMENT: AN ACADEMIC PERSPECTIVE, VOLS 1-2 | 2010年
关键词
Risk; risk assessment; risk management; information security; decision-making;
D O I
暂无
中图分类号
C93 [管理学];
学科分类号
12 ; 1201 ; 1202 ; 120202 ;
摘要
The globalization imposed a re-assessment of the security concepts, reconsideration and extension of the responsibilities in the field of information security. Organizations are continuously confronted with complex threats to information they handle and to the information systems they administer. The information security risk management emerged as an efficient and comprehensive procedure that complements the overall management of almost all aspects of our lives. Managers in very diverse types of organizations, with different missions, all incorporate risk assessment in their decision-making processes. At present, more and more managers in industry and government organizations are allocating a large part of their resources to the task of improving their understanding and approach to risk-based decision-making. The study revolves around the premises that information systems going through a systematic risk assessment and management process and associated decision-making steps would attain significantly better the information security objectives than systems that do not. The paper provides an overview of the theoretical approaches to information security risk management, as an essential step in developing effective information security systems. The article aims at advancing the current theories in order to develop adapted methods for different types of organizations.
引用
收藏
页码:304 / 309
页数:6
相关论文
共 10 条
[1]  
[Anonymous], 2002, NIST SPECIAL PUBLICA
[2]  
Collingridge David., 1996, ACCIDENT DESIGN CONT
[3]  
Culp Christopher L., RISK MANAGE PROC BUS
[4]  
Frame J.D., 2003, Managing risk in organizations: A guide for managers
[5]  
Haimes YY., 2009, Risk Modeling, Assessment, and Management
[6]  
Landoll Douglas J., 2010, SECURITY RISK ASSESS
[7]   From comparative risk assessment to multi-criteria decision analysis and adaptive management: Recent developments and applications [J].
Linkov, I. ;
Satterstrom, F. K. ;
Kiker, G. ;
Batchelor, C. ;
Bridges, T. ;
Ferguson, E. .
ENVIRONMENT INTERNATIONAL, 2006, 32 (08) :1072-1093
[8]  
Peltier T. R., 2010, Information Security Risk Analysis, V3rd
[9]  
Ross Steven J., 2010, APPL ISO 27005 RISK
[10]  
Vellani K.H., 2007, STRATEGIC SECURITY M