A Dependency analysis for Information Security and Risk Management

被引:2
|
作者
Krishna, B. Chaitanya [1 ]
Subrahmanyam, Kodukula [1 ]
Kim, Tai-hoon [2 ]
机构
[1] KL Univ, Dept Comp Sci & Engn, Guntur, Andhra Pradesh, India
[2] Sungshin Womens Univ, Dept Convergence Secur, Seoul 136742, South Korea
关键词
Risk; security; information systems security; risk management; software products; hackers;
D O I
10.14257/ijsia.2015.9.8.17
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Today major issue in IT Sector is security, now a day in every field software products are using at the same time users are struggles for their information and data security. Normally software engineers developed good software and test the all aspects and deliver to the user but they cannot bother about minuet problems because they think that those problems cannot impact the product output. But in the run time environment those problems create major problems and display the wrong outputs. Software hackers also using these minuet problems hacked the system and spoil the data. There are so many methods are available for information security and risk management but those are not universally accepted methods. In this paper I proposed a novel method for information security and risk management. Using this method to develop application very well and if any hidden mistakes are there in development stage those risks are identified in run time environment and reduce risk and provide security to the data.
引用
收藏
页码:205 / 210
页数:6
相关论文
共 50 条
  • [21] Information Security Risk Management in a World of Services
    Lalanne, Vincent
    Munier, Manuel
    Gabillon, Alban
    [J]. 2013 ASE/IEEE INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING (SOCIALCOM), 2013, : 586 - 593
  • [22] A DSS for information security analysis: Computer support in a company's risk management
    Finne, T
    [J]. INFORMATION INTELLIGENCE AND SYSTEMS, VOLS 1-4, 1996, : 193 - 198
  • [24] Information Security Risk Management: In Which Security Solutions Is It Worth Investing?
    Fenz, Stefan
    Ekelhart, Andreas
    Neubauer, Thomas
    [J]. COMMUNICATIONS OF THE ASSOCIATION FOR INFORMATION SYSTEMS, 2011, 28 : 329 - 356
  • [25] Survey on Information System Security Risk Management alignment
    Abbass, Wissam
    Baina, Amine
    Bellafkih, Mostafa
    [J]. 2016 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY FOR ORGANIZATIONS DEVELOPMENT (IT4OD), 2016,
  • [26] Information Security Risk Management and Incompatible Parts of Organization
    Talabeigi, Elham
    Naeeini, Seyyed Gholamreza Jalali
    [J]. JOURNAL OF INDUSTRIAL ENGINEERING AND MANAGEMENT-JIEM, 2016, 9 (04): : 964 - 977
  • [27] An economic modelling approach to information security risk management
    Bojanc, Rok
    Jerman-Blazic, Borka
    [J]. INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2008, 28 (05) : 413 - 422
  • [28] A situation awareness model for information security risk management
    Webb, Jeb
    Ahmad, Atif
    Maynard, Sean B.
    Shanks, Graeme
    [J]. COMPUTERS & SECURITY, 2014, 44 : 1 - 15
  • [29] Information security risk management terminology and key concepts
    Schmidt, Michael
    [J]. RISK MANAGEMENT-AN INTERNATIONAL JOURNAL, 2023, 25 (01):
  • [30] Enterprise Information Technology Security: Risk Management Perspective
    Rot, Artur
    [J]. WCECS 2009: WORLD CONGRESS ON ENGINEERING AND COMPUTER SCIENCE, VOLS I AND II, 2009, : 1171 - 1176