Information Security Risk Assessment & Pointed Reporting: Scalable Approach

被引:0
|
作者
Bhilare, D. S. [1 ]
Ramani, A. K. [1 ]
Tanwani, Sanjay [1 ]
机构
[1] Devi Ahilya Univ, Sch Comp Sci, Indore, Madhya Pradesh, India
关键词
information security; security assessment; pointed reporting; distributed defense; iterative implementation;
D O I
10.1109/ICCET.2009.218
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Network Managers of Higher Educational Institutes, are well aware of general Information Security issues, related to Campus Networks. There are well developed security metrics, giving exhaustive list of security controls, required to mitigate different risks. Accordingly, various security measures and technologies are being deployed. However, at present, not enough attention is being paid on measuring the effectiveness of these controls and overall state of security in the institution. In this study, attempt is made to build a metric based assessment and reporting plan, specific to the needs of an academic environment. Proposed assessment metric facilitates iterative implementation, by prioritizing each metric. Secondly, to reduce response time, a novel approach of pointed reporting is suggested, where responsibilities are distributed across the institution, based on relevant roles. In this approach, security exceptions are reported directly to the predefined roles, responsible for that particular security control. This pointed reporting, delivers message to the right person in minimum time, resulting in improved response time. The proposed assessment metric and pointed reporting structure, will improve overall security governance. As security measures and practices can be assessed systematically and remedial actions can be taken in less time, which is so crucial for effective security governance.
引用
收藏
页码:365 / 370
页数:6
相关论文
共 50 条
  • [21] Information security risk assessment, aggregation, and mitigation
    Lenstra, A
    Voss, T
    [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2004, 3108 : 391 - 401
  • [22] A Study of Information Security Evaluation and Risk Assessment
    Li, Jingyi
    Chao, Shiwei
    Huo, Minxia
    [J]. 2015 FIFTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION AND MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC), 2015, : 1909 - 1912
  • [23] Risk assessment of human error in information security
    Cheng, Xiang-Yun
    Wang, Ying-Mei
    Xu, Zi-Ling
    [J]. PROCEEDINGS OF 2006 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2006, : 3573 - +
  • [24] On the role of the Facilitator in information security risk assessment
    Lizzie Coles-Kemp
    Richard E. Overill
    [J]. Journal in Computer Virology, 2007, 3 (2): : 143 - 148
  • [25] A framework and tool for the assessment of information security risk, the reduction of information security cost and the sustainability of information security culture
    Govender S.G.
    Kritzinger E.
    Loock M.
    [J]. Personal and Ubiquitous Computing, 2021, 25 (05) : 927 - 940
  • [26] Overview of Enterprise Information Needs in Information Security Risk Assessment
    Korman, Matus
    Ekstedt, Mathias
    Sommestad, Teodor
    Hallberg, Jonas
    Bengtsson, Johan
    [J]. PROCEEDINGS OF THE 2014 IEEE 18TH INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE (EDOC 2014), 2014, : 42 - 51
  • [27] New approach to risk controlling in information security
    Zolotareva, G.
    Zolotarev, V.
    Filko, S.
    [J]. XII INTERNATIONAL SCIENTIFIC AND TECHNICAL CONFERENCE APPLIED MECHANICS AND SYSTEMS DYNAMICS, 2019, 1210
  • [28] A Weighted Monte Carlo Simulation Approach to Risk Assessment of Information Security Management System
    Bamakan, Seyed Mojtaba Hosseini
    Dehghanimohammadabadi, Mohammad
    [J]. INTERNATIONAL JOURNAL OF ENTERPRISE INFORMATION SYSTEMS, 2015, 11 (04) : 63 - 78
  • [29] Risk Assessment of Power Information Risk Security Based on Risk Matrix
    Wang Xu
    Chen Tao
    Wang Yujie
    Guo Qinrui
    Teng Yangxin
    [J]. PROCEEDINGS OF 2018 IEEE 3RD ADVANCED INFORMATION TECHNOLOGY, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IAEAC 2018), 2018, : 1494 - 1498
  • [30] LiSRA: Lightweight Security Risk Assessment for decision support in information security
    Schmitz, Christopher
    Pape, Sebastian
    [J]. COMPUTERS & SECURITY, 2020, 90