Semi-automated Information Security Risk Assessment Framework for Analyzing Enterprises Security Maturity Level

被引:2
作者
Abazi, Blerton [1 ]
Ko, Andrea [2 ]
机构
[1] Univ Business & Technol UBT, Prishtina, Kosovo
[2] Corvinus Univ Budapest, Budapest, Hungary
来源
RESEARCH AND PRACTICAL ISSUES OF ENTERPRISE INFORMATION SYSTEMS, CONFENIS 2019 | 2019年 / 375卷
关键词
Information security and privacy; Risk assessment; Enterprises; ISO; 27001;
D O I
10.1007/978-3-030-37632-1_13
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
While organizations spend millions of dollars on developing security systems at the highest level, one of the most significant areas of weaknesses, and loss remain their employees. Lack of employee training and security expertise, therefore, can cause huge loss, despite other measure being put in place. Cyberattacks are often able to commit cybercrime due to a lack of qualified cyber-security staff and the limited number of IT staff employed to keep pace with continuing security development and advancement. Testing, training and employing staff therefore is a critical measure for all organizations to reduce the vulnerabilities yet seems to be an area still not fully addressed. Businesses and organizations need to provide training to promote understanding for staff at every level, so they are aware of their roles and responsibilities in protecting against security threats. However, this is a colossal undertaking, and until this learning gap is resolved, financial institutions must continue to fight and efficiently manage cybersecurity threats. The aim of the current research paper is to present and propose a semi-automated risk assessment framework and a security maturity model, which can be helpful for auditors, security officers and managers. It is based on the ISO 27001 and utilize the relevant standards as well. The related risk management solution is a web-based software application. The current study targeted information security in Kosovo, specifically in the banking sector, IT industry and insurance field.
引用
收藏
页码:141 / 152
页数:12
相关论文
共 30 条
[1]  
Abazi B., 2019, NOVEL APPROACH RISK
[2]  
[Anonymous], 2013, Global Journal of Flexible Systems Management, DOI [DOI 10.1007/S40171-013-0047-4, 10.1007/s40171-013-0047-4]
[3]  
Becker J., 2010, Maturity Models in IS Research, ECIS 2010, Proceedings
[4]  
Burgeois D. T., 2014, INFORM SYSTEMS BUSIN
[5]  
Businge J., 2010, EVOL IWPSE 10, P63, DOI [10.1145/1862372.1862389, DOI 10.1145/1862372.1862389]
[6]  
De Groot J., 2019, The History of Data Breaches
[7]  
Diver S., 2007, Information Security Policy - A Development Guide for Large and Small Companies
[8]  
Dzazali Suhazimah, 2012, Journal of Systems and Information Technology, V14, P23, DOI 10.1108/13287261211221128
[9]   Practical approaches to creating a security culture [J].
Gaunt, N .
INTERNATIONAL JOURNAL OF MEDICAL INFORMATICS, 2000, 60 (02) :151-157
[10]   An Information Security Maturity Evaluation Mode [J].
Ge Xiao-yan ;
Yuan Yu-qing ;
Lu Li-lei .
INTERNATIONAL CONFERENCE ON ADVANCES IN ENGINEERING 2011, 2011, 24 :335-339