Information security risks management framework - A step towards mitigating security risks in university network

被引:39
|
作者
Joshi, Chanchala [1 ]
Singh, Umesh Kumar [2 ]
机构
[1] Vikram Univ Ujjain, Inst Comp Sci, Ujjain, Madhya Pradesh, India
[2] Vikram Univ Ujjain, Sch Engn & Technol, Ujjain, Madhya Pradesh, India
关键词
Security risk; Security threats; University campus network; Vulnerability;
D O I
10.1016/j.jisa.2017.06.006
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Information is one of the most prominent assets for Universities and must be protected from security breach. This paper analyzed the security threats specifically evolve in University's network, and with consideration of these issues, proposed information security framework for University network environment. The proposed framework reduces the risk of security breach by supporting three phase activities; the first phase assesses the threats and vulnerabilities in order to identify the weak point in educational environment, the second phase focuses on the highest risk and create actionable remediation plan, the third phase of risk assessment model recognizes the vulnerability management compliance requirement in order to improve University's security position. The proposed framework is applied on Vikram University Ujjain India's, computing environment and the evaluation result showed the proposed framework enhances the security level of University campus network. This model can be used by risk analyst and security manager of University to perform reliable and repeatable risk analysis in realistic and affordable manner. (C) 2017 Elsevier Ltd. All rights reserved.
引用
收藏
页码:128 / 137
页数:10
相关论文
共 50 条
  • [1] A framework for the management of information security risks
    Jones, A.
    [J]. BT TECHNOLOGY JOURNAL, 2007, 25 (01) : 30 - 36
  • [2] Information Security Risks Assessment in Telecommunication Network of the University
    Anikin, Igor V.
    [J]. 2016 DYNAMICS OF SYSTEMS, MECHANISMS AND MACHINES (DYNAMICS), 2016,
  • [3] Risks Management relating to Information Systems Security Treatment of IT Equipment Security Risks
    Baicu, Floarea
    Baicu, Andrei Mihai
    [J]. QUALITY-ACCESS TO SUCCESS, 2012, 13 (131): : 108 - 112
  • [4] Optimal Network Topologies for Mitigating Security and Epidemic Risks
    Hota, Ashish R.
    Sundaram, Shreyas
    [J]. 2016 54TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2016, : 1129 - 1136
  • [5] Mitigating the Security Risks of Unified Communications
    Almeida, Fernando
    Cruz, Jose
    Oliveira, Jose
    [J]. PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND APPLICATIONS, 2009, : 303 - 307
  • [6] Management of Information Security Risks in a Context of Uncertainty
    Azhmukhamedov, I. M.
    Vybornova, O. N.
    Brumshtein, Yu. M.
    [J]. AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2016, 50 (08) : 657 - 663
  • [7] Mitigating Ransomware Risks in Manufacturing and the Supply Chain: A Comprehensive Security Framework
    Aljoghaiman, Abdulaziz
    Sundram, Veera Pandiyan Kaliani
    [J]. INTERNATIONAL JOURNAL OF CYBER CRIMINOLOGY, 2023, 17 (02): : 231 - 249
  • [8] INFORMATION RISKS AND ECONOMIC SECURITY
    Okhrimenko, S. A.
    Solonenko, O.
    [J]. FINANCIAL AND CREDIT ACTIVITY-PROBLEMS OF THEORY AND PRACTICE, 2010, 1 (08): : 200 - 204
  • [9] Information security: Coping with risks
    Malik, B
    [J]. FORBES, 1997, : 26 - &
  • [10] Understanding and Mitigating Security Risks of Network on Medical Cyber Physical System
    Li, Zhangtan
    Cheng, Liang
    Zhang, Yang
    Feng, Dengguo
    [J]. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2021, PT II, 2021, 12938 : 123 - 134