Overview of Enterprise Information Needs in Information Security Risk Assessment

被引:13
|
作者
Korman, Matus [1 ]
Ekstedt, Mathias [1 ]
Sommestad, Teodor [2 ]
Hallberg, Jonas [2 ]
Bengtsson, Johan [2 ]
机构
[1] KTH, Royal Inst Technol, S-10044 Stockholm, Sweden
[2] FOI, Swedish Def Res Agcy, S-58330 Linkoping, Sweden
关键词
MANAGEMENT;
D O I
10.1109/EDOC.2014.16
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Methods for risk assessment in information security suggest users to collect and consider sets of input information, often notably different, both in type and size. To explore these differences, this study compares twelve established methods on how their input suggestions map to the concepts of ArchiMate, a widely used modeling language for enterprise architecture. Hereby, the study also tests the extent, to which ArchiMate accommodates the information suggested by the methods (e.g., for the use of ArchiMate models as a source of information for risk assessment). Results of this study show how the methods differ in suggesting input information in quantity, as well as in the coverage of the ArchiMate structure. Although the translation between ArchiMate and the methods' input suggestions is not perfect, our results indicate that ArchiMate is capable of modeling fair portions of the information needed for the methods for information security risk assessment, which makes ArchiMate models a promising source of guidance for performing risk assessments.
引用
收藏
页码:42 / 51
页数:10
相关论文
共 50 条
  • [21] Enterprise information security strategies
    Anderson, Evan E.
    Choobineh, Joobin
    COMPUTERS & SECURITY, 2008, 27 (1-2) : 22 - 29
  • [22] Enterprise risk management and information technology security in the financial sector
    Kwateng, Kwame Owusu
    Amanor, Christopher
    Tetteh, Francis Kamewor
    INFORMATION AND COMPUTER SECURITY, 2022, 30 (03) : 422 - 451
  • [23] Enterprise architecture to enhance security and risk management of information systems
    School of Software, Tsinghua University, Beijing 100084, China
    Qinghua Daxue Xuebao, 2009, SUPPL. 2 (2073-2086):
  • [24] A risk recommendation approach for information security risk assessment
    Chu, Ya-Chi
    Wei, Yu-Chih
    Chang, Wen-Hsuan
    2013 15TH ASIA-PACIFIC NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (APNOMS), 2013,
  • [25] Information security risk assessment model for risk management
    Wawrzyniak, Dariusz
    TRUST, PRIVACY, AND SECURITY IN DIGITAL BUSINESS, PROCEEDINGS, 2006, 4083 : 21 - 30
  • [26] The Application of Big Data and Artificial Intelligence Technology in Enterprise Information Security Management and Risk Assessment
    Wang, Qi
    Zong, Bangfeng
    Lin, Yong
    Li, Zhuangzhuang
    Luo, Xv
    JOURNAL OF ORGANIZATIONAL AND END USER COMPUTING, 2023, 35 (01)
  • [27] Attack Tree Based Information Security Risk Assessment Method Integrating Enterprise Objectives with Vulnerabilities
    Karabey, Bugra
    Baykal, Nazife
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2013, 10 (03) : 297 - 304
  • [28] Information Security Risk Assessment of Commercial Organizations
    Kupriyanov, A. O.
    Babenko, A. A.
    Bakhracheva, Y. S.
    PHYSICS, TECHNOLOGIES AND INNOVATION (PTI-2019), 2019, 2174
  • [29] An approach to support information security risk assessment
    Genchev, Petko
    PROCEEDINGS OF THE 2020 INTERNATIONAL CONFERENCE ON BIOMEDICAL INNOVATIONS AND APPLICATIONS (BIA 2020), 2020, : 125 - 128
  • [30] Information visualization in information security management for enterprise's information infrastructure
    Miloslavskaya, N.
    Tolstoy, A.
    Birjukov, A.
    Scientific Visualization, 2014, 6 (02): : 74 - 91