A Quantitative Model for Information-Security Risk Management

被引:21
|
作者
Bojanc, Rok [1 ]
Jerman-Blazic, Borka [2 ]
机构
[1] ZZI, Ljubljana, Slovenia
[2] Univ Ljubljana, Ljubljana 61000, Slovenia
关键词
Risk Management; Risk Assessment; Information Security; Optimal Investment; Quantitative Evaluation; ECONOMICS;
D O I
10.1080/10429247.2013.11431972
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Information-security risk management is becoming an increasingly important process in modern businesses. The proposed model for managing information-security risks is based on a quantitative analysis of the security risks that enable organizations to introduce optimum security solutions. The model is designed as a standard procedure to lead the organization from the initial selection of input data to the final recommendations for the selection of the appropriate solutions, which reduces a certain security risk. In analyzing the security risks, the model quantitatively evaluates the information assets, their vulnerability, and the threats to information assets. The values of the risk parameters are the basis for selecting the appropriate risk treatment and the evaluation of the various security measures that reduce security risks. Economic indicators are determined for each security measure in order to enable a comparison of the various security measures. This includes the possibility of investing in technology-security solutions, the introduction of organizational procedures, and the training and transfer of risk to an outsourcing provider or to an insurance agency. The model was tested using empirical examples with data from a real business environment.
引用
收藏
页码:25 / 37
页数:13
相关论文
共 50 条
  • [1] Soft-Power Requirements in Information-Security Management
    Astakhova, L. V.
    [J]. SCIENTIFIC AND TECHNICAL INFORMATION PROCESSING, 2016, 43 (03) : 162 - 165
  • [2] The Concept of the Information-security Culture
    Astakhova, L. V.
    [J]. SCIENTIFIC AND TECHNICAL INFORMATION PROCESSING, 2014, 41 (01) : 22 - 28
  • [3] An Environment-Specific Prioritization Model for Information-Security Vulnerabilities Based on Risk Factor Analysis
    Reyes, Jorge
    Fuertes, Walter
    Arevalo, Paco
    Macas, Mayra
    [J]. ELECTRONICS, 2022, 11 (09)
  • [4] Automatically building an information-security vulnerability database
    Armold, Adrian D.
    Hyla, Bret M.
    Rowe, Neil C.
    [J]. 2006 IEEE INFORMATION ASSURANCE WORKSHOP, 2006, : 376 - +
  • [5] Information security risk assessment model for risk management
    Wawrzyniak, Dariusz
    [J]. TRUST, PRIVACY, AND SECURITY IN DIGITAL BUSINESS, PROCEEDINGS, 2006, 4083 : 21 - 30
  • [6] Clustering of information-security standards of the Russian Federation
    Arutyunov V.V.
    [J]. Scientific and Technical Information Processing, 2017, 44 (2) : 125 - 133
  • [7] Risk-Management Framework and Information-Security Systems for Small and Medium Enterprises (SMEs): A Meta-Analysis Approach
    AL-Dosari, Khalifa
    Fetais, Noora
    [J]. ELECTRONICS, 2023, 12 (17)
  • [8] A situation awareness model for information security risk management
    Webb, Jeb
    Ahmad, Atif
    Maynard, Sean B.
    Shanks, Graeme
    [J]. COMPUTERS & SECURITY, 2014, 44 : 1 - 15
  • [9] Information Security Risk Management Model for Big Data
    Yang, Min
    [J]. ADVANCES IN MULTIMEDIA, 2022, 2022
  • [10] Fuzzy OWA Model for Information Security Risk Management
    Imamverdiev, Ya. N.
    Derakshande, S. A.
    [J]. AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2011, 45 (01) : 20 - 28