A Business Aware Information Security Risk Analysis Method

被引:3
作者
Sadok, M. [1 ]
Spagnoletti, P. [2 ]
机构
[1] Inst Technol Commun Tunis, Techno Pk El Ghazala, Ariana 2088, Tunisia
[2] CeRSI LUISS Guido Carli Univ, I-00198 Rome, Italy
来源
INFORMATION TECHNOLOGY AND INNOVATION TRENDS IN ORGANIZATIONS | 2011年
关键词
MANAGEMENT; MODEL;
D O I
10.1007/978-3-7908-2632-6_51
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Securing the organization critical information assets from sophisticated insider threats and outsider attacks is essential to ensure business continuity and efficiency. The information security risk management (ISRM) is the process that identifies the threats and vulnerabilities of an enterprise information system, evaluates the likelihood of their occurrence and estimates their potential business impact. It is a continuous process that allows cost effectiveness of implemented security controls and provides a dynamic set of tools to monitor the security level of the information system. However, the examination of existing practices of the enterprises reveals a poor effectiveness of information security management processes such as stated in the information security breaches surveys. In particular, the enterprises experience difficulties in assessing and managing their security risks, in implementing appropriate security controls, as well as in preventing security threats. The available ISRM models and frameworks mainly focus on the technical modules related to the development of security mitigation and prevention and do not pay much attention to the influence of business variables affecting the reliability of the provided solutions. This paper discusses the major business related factors for risk analysis and shows their interference in the ISRM process. These factors include the enterprise strategic environment, the organizational structure features, the customer relationship and the value chain configuration.
引用
收藏
页码:453 / 460
页数:8
相关论文
共 17 条
[1]  
Ahlfeldt RM, 2007, INT FED INFO PROC, V232, P73
[2]  
[Anonymous], 2002, Managing Information Security Risks: The OCTAVE Approach
[3]  
[Anonymous], 2009 CSI COMP CRIM S
[4]  
[Anonymous], 177992000 ISOIEC 1
[5]  
Bandyopadhyay K., 1999, Management Decision, V37, P437, DOI 10.1108/00251749910274216
[6]  
Broderick Dr., 2001, Information Security Technical Report, V6, P12
[7]   Comparative framework for risk analysis methods [J].
Eloff, J.H.P. ;
Labuschagne, L. ;
Badenhorst, K.P. .
Computers and Security, 1993, 12 (06) :597-603
[8]   Information systems risk management: Key concepts and business processes [J].
Finne, T .
COMPUTERS & SECURITY, 2000, 19 (03) :234-242
[9]   Management of risk in the information age [J].
Gerber, M ;
von Solms, R .
COMPUTERS & SECURITY, 2005, 24 (01) :16-30
[10]   Computer and network security risk management: Theory, challenges, and countermeasures [J].
Hamdi, M ;
Boudriga, N .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2005, 18 (08) :763-793