INFORMATION SECURITY ASPECT OF OPERATIONAL RISK MANAGEMENT

被引:0
|
作者
Zawila-Niedzwiecki, Janusz [1 ]
Byczkowski, Maciej [2 ]
机构
[1] Warsaw Univ Technol, Fac Management, Ul Narbutta 85, PL-02524 Warsaw, Poland
[2] European Network Secur Inst, PL-00141 Warsaw, Poland
关键词
operational risk; risk management; information security; information security management; IT security;
D O I
10.2478/v10238-012-0010-2
中图分类号
C93 [管理学];
学科分类号
12 ; 1201 ; 1202 ; 120202 ;
摘要
Improving organization means on the one hand searching for adequate product (service) matched to the market, on the other hand shaping the ability to react on risks caused by that activity. The second should consist of identifying and estimating types of risk, and consequently creating solutions securing from possible forms of it's realization (disturbances), following rules of rational choice of security measures as seen in their relation to costs and effectiveness. Activities of creating the security measures should be organized as constantly developing and perfecting and as such they need formal place in organizational structure and rules of management
引用
收藏
页码:45 / 60
页数:16
相关论文
共 50 条
  • [1] INFORMATION SECURITY OF THE BANK IN THE OPERATIONAL RISK MANAGEMENT SYSTEM
    Bezshtanko, D. V.
    FINANCIAL AND CREDIT ACTIVITY-PROBLEMS OF THEORY AND PRACTICE, 2012, 1 (12):
  • [2] Information Security Governance - Compliance management vs operational management
    von Solms, SH
    COMPUTERS & SECURITY, 2005, 24 (06) : 443 - 447
  • [3] The Information Security Risk Management
    Semin, Valeriy G.
    Shmakova, Elena G.
    Los, Lexei B.
    PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE QUALITY MANAGEMENT,TRANSPORT AND INFORMATION SECURITY, INFORMATION TECHNOLOGIES (IT&QM&IS), 2017, : 106 - 109
  • [4] Information security and risk management
    Bodin, Lawrence D.
    Gordon, Lawrence A.
    Loeb, Martin P.
    COMMUNICATIONS OF THE ACM, 2008, 51 (04) : 64 - 68
  • [5] The Operational Role of Security Information and Event Management Systems
    Bhatt, Sandeep
    Manadhata, Pratyusa K.
    Zomlot, Loai
    IEEE SECURITY & PRIVACY, 2014, 12 (05) : 35 - 41
  • [6] Security through Information Risk Management
    Johnson, M. Eric
    Goetz, Eric
    Pfleeger, Shari Lawrence
    IEEE SECURITY & PRIVACY, 2009, 7 (03) : 45 - 52
  • [7] The Quantification Management of Information Security Risk
    Lao, Guoling
    Wang, Liping
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 10377 - 10380
  • [8] From information security management to enterprise risk management
    Stoll, Margareth
    Lecture Notes in Electrical Engineering, 2015, 313 : 9 - 16
  • [9] Enterprise Risk Management and Information Systems Security Risk
    Olson, David L.
    Wu, Desheng
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON RISK MANAGEMENT & GLOBAL E-BUSINESS, VOLS I AND II, 2009, : 1 - 5
  • [10] Information security risk assessment model for risk management
    Wawrzyniak, Dariusz
    TRUST, PRIVACY, AND SECURITY IN DIGITAL BUSINESS, PROCEEDINGS, 2006, 4083 : 21 - 30