Enterprise Information Technology Security: Risk Management Perspective

被引:0
|
作者
Rot, Artur [1 ]
机构
[1] Wroclaw Univ Econ, Dept Management Informat Syst Engn, Business Informat Inst, Wroclaw, Poland
关键词
IT security risk; IT security risk management; computer support of risk management; risk management practice;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The risk connected with the wide application of information technologies in business grows together with the increase of enterprise's correlation from its customers, business partners and outsourced operations. Technological progress generates dependencies which evoke growth of diversities, complexity, non-descriptiveness and quantity of risk factors. In insufficient investments on information security the issue of IT risk management becomes more significant, concentrating on searching optimal proportion between threats and costs of IT systems protections. In such a dynamic development of Information Technologies the time needed for appropriate reaction on risk is decidedly shortened. The lack of appropriate preparation may lead the company to collapse, thus appropriate reaction on risk constitutes about possibilities of survival and development of enterprise. The problem of IT risk management is very complex issue. One of the most important stages of this process is risk analysis, used for optimization, and correctly for minimizations of losses connected with risk. The article presents the issue of IT security risk management, discusses the most significant stage of risk management which is IT security risk analysis. Chosen computer applications supporting these processes will be presented. Selected research connected with IT security risk management will be also discussed.
引用
收藏
页码:1171 / 1176
页数:6
相关论文
共 50 条
  • [1] Enterprise risk management and information technology security in the financial sector
    Kwateng, Kwame Owusu
    Amanor, Christopher
    Tetteh, Francis Kamewor
    [J]. INFORMATION AND COMPUTER SECURITY, 2022, 30 (03) : 422 - 451
  • [2] Application of Big Data Technology in Enterprise Information Security Management and Risk Assessment
    Wang, Yawen
    Xue, Weixian
    Zhang, Anqi
    [J]. JOURNAL OF GLOBAL INFORMATION MANAGEMENT, 2023, 31 (03)
  • [3] From information security management to enterprise risk management
    Stoll, Margareth
    [J]. Lecture Notes in Electrical Engineering, 2015, 313 : 9 - 16
  • [4] Enterprise Risk Management and Information Systems Security Risk
    Olson, David L.
    Wu, Desheng
    [J]. PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON RISK MANAGEMENT & GLOBAL E-BUSINESS, VOLS I AND II, 2009, : 1 - 5
  • [5] Research on Enterprise Information Security Risk Management
    Wu Xiaoyan
    Yuan Hong
    Lin Hua
    [J]. PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON INNOVATION AND MANAGEMENT, 2013, : 924 - +
  • [6] A Case Study on Risk Management of Enterprise Information Security
    Huang, Rengen
    Zhu, Zhen
    [J]. 2015 2nd International Conference on Creative Education (ICCE 2015), Pt 2, 2015, 11 : 201 - 208
  • [7] The Application of Big Data and Artificial Intelligence Technology in Enterprise Information Security Management and Risk Assessment
    Wang, Qi
    Zong, Bangfeng
    Lin, Yong
    Li, Zhuangzhuang
    Luo, Xv
    [J]. JOURNAL OF ORGANIZATIONAL AND END USER COMPUTING, 2023, 35 (01)
  • [8] Overview of Information Security Management-Based on Enterprise Risk Management
    She, Jing-Huai
    Zhang, Run-Qiang
    She, Yuan
    Hou, Bing-Xin
    [J]. INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND INFORMATION SECURITY (CNIS 2015), 2015, : 384 - 387
  • [9] Information technology, security and risk management (paperback)
    Fitz-Gerald, S.
    [J]. JOURNAL OF THE OPERATIONAL RESEARCH SOCIETY, 2008, 59 (08) : 1146 - 1147
  • [10] Study on The Application of Information Technology in Enterprise Risk Management
    Li, Lingju
    [J]. PROCEEDINGS OF 2013 INTERNATIONAL CONFERENCE ON QUALITY, RELIABILITY, RISK, MAINTENANCE, AND SAFETY ENGINEERING (QR2MSE), VOLS I-IV, 2013, : 2146 - 2150