A Dependency analysis for Information Security and Risk Management

被引:2
|
作者
Krishna, B. Chaitanya [1 ]
Subrahmanyam, Kodukula [1 ]
Kim, Tai-hoon [2 ]
机构
[1] KL Univ, Dept Comp Sci & Engn, Guntur, Andhra Pradesh, India
[2] Sungshin Womens Univ, Dept Convergence Secur, Seoul 136742, South Korea
关键词
Risk; security; information systems security; risk management; software products; hackers;
D O I
10.14257/ijsia.2015.9.8.17
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Today major issue in IT Sector is security, now a day in every field software products are using at the same time users are struggles for their information and data security. Normally software engineers developed good software and test the all aspects and deliver to the user but they cannot bother about minuet problems because they think that those problems cannot impact the product output. But in the run time environment those problems create major problems and display the wrong outputs. Software hackers also using these minuet problems hacked the system and spoil the data. There are so many methods are available for information security and risk management but those are not universally accepted methods. In this paper I proposed a novel method for information security and risk management. Using this method to develop application very well and if any hidden mistakes are there in development stage those risks are identified in run time environment and reduce risk and provide security to the data.
引用
收藏
页码:205 / 210
页数:6
相关论文
共 50 条
  • [31] Information security risk management terminology and key concepts
    Michael Schmidt
    [J]. Risk Management, 2023, 25
  • [32] Information Security Risk Management Model for Big Data
    Yang, Min
    [J]. ADVANCES IN MULTIMEDIA, 2022, 2022
  • [33] A management perspective on risk of security threats to information systems
    Farahmand F.
    Navathe S.B.
    Sharp G.P.
    Enslow P.H.
    [J]. Information Technology and Management, 2005, 6 (2-3) : 203 - 225
  • [34] CORRELATED FAILURES, DIVERSIFICATION, AND INFORMATION SECURITY RISK MANAGEMENT
    Chen, Pei-yu
    Kataria, Gaurav
    Krishnan, Ramayya
    [J]. MIS QUARTERLY, 2011, 35 (02) : 397 - 422
  • [35] A Case Study on Risk Management of Enterprise Information Security
    Huang, Rengen
    Zhu, Zhen
    [J]. 2015 2nd International Conference on Creative Education (ICCE 2015), Pt 2, 2015, 11 : 201 - 208
  • [36] Fuzzy OWA Model for Information Security Risk Management
    Imamverdiev, Ya. N.
    Derakshande, S. A.
    [J]. AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2011, 45 (01) : 20 - 28
  • [37] A meta-process for information security risk management
    Papadaki, Katerina
    Polemi, Nineta
    Damilos, Dimitrios Konnos
    [J]. GLOBAL E-SECURITY, PROCEEDINGS, 2008, 12 : 257 - +
  • [38] Assets Dependencies Model in Information Security Risk Management
    Breier, Jakub
    Schindler, Frank
    [J]. INFORMATION AND COMMUNICATION TECHNOLOGY, 2014, 8407 : 405 - 412
  • [39] Verification, Validation, and Evaluation in Information Security Risk Management
    Fenz, Stefan
    Ekelhart, Andreas
    [J]. IEEE SECURITY & PRIVACY, 2011, 9 (02) : 58 - 65
  • [40] INFORMATION SECURITY OF THE BANK IN THE OPERATIONAL RISK MANAGEMENT SYSTEM
    Bezshtanko, D. V.
    [J]. FINANCIAL AND CREDIT ACTIVITY-PROBLEMS OF THEORY AND PRACTICE, 2012, 1 (12):