Security risk analysis and management

被引:2
作者
Anton, Nicolae [1 ]
Nedelcu, Anisor [1 ]
机构
[1] Transilvania Univ Brasov, Fac Technol Engn & Ind Management, B Dul Eroilor 29, Brasov, Romania
来源
22ND INTERNATIONAL CONFERENCE ON INNOVATIVE MANUFACTURING ENGINEERING AND ENERGY - IMANE&E 2018 | 2018年 / 178卷
关键词
D O I
10.1051/matecconf/201817808015
中图分类号
TE [石油、天然气工业]; TK [能源与动力工程];
学科分类号
0807 ; 0820 ;
摘要
The management system of informational security is a part of the management system of an organization, that approaches the management of risk from the point of view of the involved information, approach that is used in order to set, to implement, to function, to monitor, to revise, to maintain and to improve the informational security at the organizational level, referring to the progress of the processes required by the management of risk in order to guarantee the security of the information. The appreciation of the efficiency of the security system represents a difficult problem and it contains many elements of subjectiveness, because the analysis of the security risks of information implies using some interviewing techniques based on questionnaires provided by experts in security, that in most of the cases come from outside the organization. This study does not analyse the risk concept, it focuses more on the analysis and the risk management on the practical part using AHP method. Managing the risk and the security requirements are connected by a set of practices and management tools generally used in order to manage the security risk of information. It is essential that the tool and the model used should reflect the objective needs of the organization from the point of view of the management of risk.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] Risk Management Theory Application in national information security risk control-Analysis of the relationship between classified protection and risk management
    Bi, Maning
    Jing, Yuan
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON AUTOMATION, MECHANICAL CONTROL AND COMPUTATIONAL ENGINEERING, 2015, 124 : 1830 - 1835
  • [42] Monitoring the Effectiveness of Security Countermeasures in a Security Risk Management Model
    Rjaibi, Neila
    Rabai, Latifa Ben Arfa
    SOFTWARE ENGINEERING IN INTELLIGENT SYSTEMS (CSOC2015), VOL 3, 2015, 349 : 327 - 337
  • [43] RAMEX - A PROTOTYPE EXPERT-SYSTEM FOR COMPUTER SECURITY RISK ANALYSIS AND MANAGEMENT
    KAILAY, MP
    JARRATT, P
    COMPUTERS & SECURITY, 1995, 14 (05) : 449 - 463
  • [44] New method for risk management in CRM security management
    Seify, Mahdi
    Third International Conference on Information Technology: New Generations, Proceedings, 2006, : 440 - 445
  • [45] Automatic security management of smart infrastructures using attack graph and risk analysis
    Ivanov, Denis
    Kalinin, Maxim
    Krudyshev, Vasiliy
    Orel, Evgeniy
    PROCEEDINGS OF THE 2020 FOURTH WORLD CONFERENCE ON SMART TRENDS IN SYSTEMS, SECURITY AND SUSTAINABILITY (WORLDS4 2020), 2020, : 295 - 300
  • [46] E-commerce Security Risk Analysis and Management Strategies of Commercial Banks
    Li Bo
    Xu Congwei
    2009 INTERNATIONAL FORUM ON INFORMATION TECHNOLOGY AND APPLICATIONS, VOL 1, PROCEEDINGS, 2009, : 423 - 425
  • [47] Systems analysis of security management
    Sienkiewicz, Piotr
    SCIENTIFIC JOURNALS OF THE MARITIME UNIVERSITY OF SZCZECIN-ZESZYTY NAUKOWE AKADEMII MORSKIEJ W SZCZECINIE, 2010, 24 (96): : 93 - 99
  • [48] A DSS for information security analysis: Computer support in a company's risk management
    Finne, T
    INFORMATION INTELLIGENCE AND SYSTEMS, VOLS 1-4, 1996, : 193 - 198
  • [49] Security Risk Analysis as a Service
    Alhomidi, Mohammed A.
    Reed, Martin J.
    2013 8TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2013, : 156 - 161
  • [50] Risk Analysis for Security Applications
    Kiekintveld, Christopher
    Marecki, Janusz
    Paruchuri, Praveen
    Sycara, Katia
    INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2010, 34 (02): : 127 - 128