Overview of Enterprise Information Needs in Information Security Risk Assessment

被引:13
|
作者
Korman, Matus [1 ]
Ekstedt, Mathias [1 ]
Sommestad, Teodor [2 ]
Hallberg, Jonas [2 ]
Bengtsson, Johan [2 ]
机构
[1] KTH, Royal Inst Technol, S-10044 Stockholm, Sweden
[2] FOI, Swedish Def Res Agcy, S-58330 Linkoping, Sweden
关键词
MANAGEMENT;
D O I
10.1109/EDOC.2014.16
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Methods for risk assessment in information security suggest users to collect and consider sets of input information, often notably different, both in type and size. To explore these differences, this study compares twelve established methods on how their input suggestions map to the concepts of ArchiMate, a widely used modeling language for enterprise architecture. Hereby, the study also tests the extent, to which ArchiMate accommodates the information suggested by the methods (e.g., for the use of ArchiMate models as a source of information for risk assessment). Results of this study show how the methods differ in suggesting input information in quantity, as well as in the coverage of the ArchiMate structure. Although the translation between ArchiMate and the methods' input suggestions is not perfect, our results indicate that ArchiMate is capable of modeling fair portions of the information needed for the methods for information security risk assessment, which makes ArchiMate models a promising source of guidance for performing risk assessments.
引用
收藏
页码:42 / 51
页数:10
相关论文
共 50 条
  • [31] Information asset valuation method for information technology security risk assessment
    Foroughi, Farhad
    WORLD CONGRESS ON ENGINEERING 2008, VOLS I-II, 2008, : 576 - 581
  • [32] Information Security Risk Assessment for the Malaysian Aeronautical Information Management System
    Alwi, Alfian
    Ariffin, Khairul Akram Zainol
    PROCEEDINGS OF THE 2018 CYBER RESILIENCE CONFERENCE (CRC), 2018,
  • [33] Risk assessment model of information security SVRAMIS
    Wu, D. (jump_wude@163.com), 2013, Science Press (40):
  • [34] Theory and methods of information security risk assessment
    Min, Jinghua
    Zhang, Jianjun
    Qinghua Daxue Xuebao/Journal of Tsinghua University, 2010, 50 (SUPPL. 1): : 1554 - 1559
  • [35] Information Security Risk Assessment: A Method Comparison
    Wangen, Gaute
    COMPUTER, 2017, 50 (04) : 52 - 61
  • [36] Taxonomy of information security risk assessment (ISRA)
    Shameli-Sendi, Alireza
    Aghababaei-Barzegar, Rouzbeh
    Cheriet, Mohamed
    COMPUTERS & SECURITY, 2016, 57 : 14 - 30
  • [37] On the role of the Facilitator in information security risk assessment
    Coles-Kemp, Lizzie
    Overill, Richard E.
    JOURNAL IN COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2007, 3 (02): : 143 - 148
  • [38] Information security risk assessment, aggregation, and mitigation
    Lenstra, A
    Voss, T
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2004, 3108 : 391 - 401
  • [39] A Study of Information Security Evaluation and Risk Assessment
    Li, Jingyi
    Chao, Shiwei
    Huo, Minxia
    2015 FIFTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION AND MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC), 2015, : 1909 - 1912
  • [40] Risk assessment of human error in information security
    Cheng, Xiang-Yun
    Wang, Ying-Mei
    Xu, Zi-Ling
    PROCEEDINGS OF 2006 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2006, : 3573 - +