A Dependency analysis for Information Security and Risk Management

被引:2
|
作者
Krishna, B. Chaitanya [1 ]
Subrahmanyam, Kodukula [1 ]
Kim, Tai-hoon [2 ]
机构
[1] KL Univ, Dept Comp Sci & Engn, Guntur, Andhra Pradesh, India
[2] Sungshin Womens Univ, Dept Convergence Secur, Seoul 136742, South Korea
关键词
Risk; security; information systems security; risk management; software products; hackers;
D O I
10.14257/ijsia.2015.9.8.17
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Today major issue in IT Sector is security, now a day in every field software products are using at the same time users are struggles for their information and data security. Normally software engineers developed good software and test the all aspects and deliver to the user but they cannot bother about minuet problems because they think that those problems cannot impact the product output. But in the run time environment those problems create major problems and display the wrong outputs. Software hackers also using these minuet problems hacked the system and spoil the data. There are so many methods are available for information security and risk management but those are not universally accepted methods. In this paper I proposed a novel method for information security and risk management. Using this method to develop application very well and if any hidden mistakes are there in development stage those risks are identified in run time environment and reduce risk and provide security to the data.
引用
收藏
页码:205 / 210
页数:6
相关论文
共 50 条
  • [1] Threat Scenario Dependency-Based Model of Information Security Risk Analysis
    Rahmad, Basuki
    Supangkat, Suhono H.
    Sembiring, Jaka
    Surendro, Kridanto
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (08): : 93 - 102
  • [2] The Information Security Risk Management
    Semin, Valeriy G.
    Shmakova, Elena G.
    Los, Lexei B.
    [J]. PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE QUALITY MANAGEMENT,TRANSPORT AND INFORMATION SECURITY, INFORMATION TECHNOLOGIES (IT&QM&IS), 2017, : 106 - 109
  • [3] Information security and risk management
    Bodin, Lawrence D.
    Gordon, Lawrence A.
    Loeb, Martin P.
    [J]. COMMUNICATIONS OF THE ACM, 2008, 51 (04) : 64 - 68
  • [5] Security through Information Risk Management
    Johnson, M. Eric
    Goetz, Eric
    Pfleeger, Shari Lawrence
    [J]. IEEE SECURITY & PRIVACY, 2009, 7 (03) : 45 - 52
  • [6] The Quantification Management of Information Security Risk
    Lao, Guoling
    Wang, Liping
    [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 10377 - 10380
  • [7] Quantitative Risk Analysis in Information Security Management: A Modern Fairy Tale
    Oppliger, Rolf
    [J]. IEEE SECURITY & PRIVACY, 2015, 13 (06) : 18 - 21
  • [8] A Collaborative Process Based Risk Analysis for Information Security Management Systems
    Karabacak, Bilge
    Ozkan, Sevgi
    [J]. PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2010, : 182 - 192
  • [9] From information security management to enterprise risk management
    Stoll, Margareth
    [J]. Lecture Notes in Electrical Engineering, 2015, 313 : 9 - 16
  • [10] Enterprise Risk Management and Information Systems Security Risk
    Olson, David L.
    Wu, Desheng
    [J]. PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON RISK MANAGEMENT & GLOBAL E-BUSINESS, VOLS I AND II, 2009, : 1 - 5