Information Security Risk Assessment & Pointed Reporting: Scalable Approach

被引:0
|
作者
Bhilare, D. S. [1 ]
Ramani, A. K. [1 ]
Tanwani, Sanjay [1 ]
机构
[1] Devi Ahilya Univ, Sch Comp Sci, Indore, Madhya Pradesh, India
关键词
information security; security assessment; pointed reporting; distributed defense; iterative implementation;
D O I
10.1109/ICCET.2009.218
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Network Managers of Higher Educational Institutes, are well aware of general Information Security issues, related to Campus Networks. There are well developed security metrics, giving exhaustive list of security controls, required to mitigate different risks. Accordingly, various security measures and technologies are being deployed. However, at present, not enough attention is being paid on measuring the effectiveness of these controls and overall state of security in the institution. In this study, attempt is made to build a metric based assessment and reporting plan, specific to the needs of an academic environment. Proposed assessment metric facilitates iterative implementation, by prioritizing each metric. Secondly, to reduce response time, a novel approach of pointed reporting is suggested, where responsibilities are distributed across the institution, based on relevant roles. In this approach, security exceptions are reported directly to the predefined roles, responsible for that particular security control. This pointed reporting, delivers message to the right person in minimum time, resulting in improved response time. The proposed assessment metric and pointed reporting structure, will improve overall security governance. As security measures and practices can be assessed systematically and remedial actions can be taken in less time, which is so crucial for effective security governance.
引用
收藏
页码:365 / 370
页数:6
相关论文
共 50 条
  • [1] A risk recommendation approach for information security risk assessment
    Chu, Ya-Chi
    Wei, Yu-Chih
    Chang, Wen-Hsuan
    [J]. 2013 15TH ASIA-PACIFIC NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (APNOMS), 2013,
  • [2] An approach to support information security risk assessment
    Genchev, Petko
    [J]. PROCEEDINGS OF THE 2020 INTERNATIONAL CONFERENCE ON BIOMEDICAL INNOVATIONS AND APPLICATIONS (BIA 2020), 2020, : 125 - 128
  • [3] A new quantitative approach for information security risk assessment
    Asosheh, Abbas
    Dehmoubed, Bijan
    Khani, Amir
    [J]. 2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 2, 2009, : 222 - +
  • [4] A new quantitative approach for information security risk assessment
    Asosheh, Abbas
    Dehmoubed, Bijan
    Khani, Amir
    [J]. ISI: 2009 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS, 2009, : 229 - 229
  • [5] Risk Assessment Approach of In-Vehicle Network Information Security
    Wanh, Jian
    Zhang, Shaowei
    Chen, Hengwei
    Wang, Pengcheng
    [J]. CICTP 2022: INTELLIGENT, GREEN, AND CONNECTED TRANSPORTATION, 2022, : 1957 - 1968
  • [6] DSR Approach to Assessment and Reduction of Information Security Risk in TELCO
    Montenegro, C.
    Murillo, M.
    Gallegos, F.
    Albuja, J.
    [J]. IEEE LATIN AMERICA TRANSACTIONS, 2016, 14 (05) : 2402 - 2410
  • [7] Asset Identification in Information Security Risk Assessment: A Business Practice Approach
    Shedden, Piya
    Ahmad, Atif
    Smith, Wally
    Tscherning, Heidi
    Scheepers, Rens
    [J]. COMMUNICATIONS OF THE ASSOCIATION FOR INFORMATION SYSTEMS, 2016, 39 : 297 - 320
  • [8] Information Security Risk Assessment in Critical Infrastructure: A Hybrid MCDM Approach
    Turskis, Zenonas
    Goranin, Nikolaj
    Nurusheva, Assel
    Boranbayev, Seilkhan
    [J]. INFORMATICA, 2019, 30 (01) : 187 - 211
  • [9] Information Security Risk Assessment in SCM
    Roy, Arup
    Gupta, A. D.
    Deshmukh, S. G.
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT (IEEM 2013), 2013, : 1002 - 1006
  • [10] Automation of Information Security Risk Assessment
    Akhmetov, Berik
    Lakhno, Valerii
    Chubaievskyi, Vitalyi
    Kaminskyi, Serhii
    Adilzhanova, Saltanat
    Ydyryshbayeva, Moldir
    [J]. INTERNATIONAL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2022, 68 (03) : 549 - +