A Collaborative Process Based Risk Analysis for Information Security Management Systems

被引:0
|
作者
Karabacak, Bilge [1 ]
Ozkan, Sevgi [2 ]
机构
[1] TUBITAK, Ankara, Turkey
[2] METU, Ankara, Turkey
关键词
ISO/IEC 27001:2005; information security; risk analysis; flow chart; process approach;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Today, many organizations quote intent for ISO/IEC 27001:2005 certification. Also, some organizations are en route to certification or already certified. Certification process requires performing a risk analysis in the specified scope. Risk analysis is a challenging process especially when the topic is information security. Today, a number of methods and tools are available for information security risk analysis. The hard task is to use the best fit for the certification. In this work we have proposed a process based risk analysis method which is suitable for ISO/IEC 27001:2005 certifications. Our risk analysis method allows the participation of staff to the determination of the scope and provides a good fit for the certification process. The proposed method has been conducted for an organization and the results of the applications are shared with the audience. The proposed collaborative risk analysis method allows for the participation of staff and managers while still being manageable in a timely manner to uncover crucial information security risks.
引用
收藏
页码:182 / 192
页数:11
相关论文
共 50 条
  • [31] Risks Management relating to Information Systems Security. Assessment Methods for the Risk Level in Information Security
    Baicu, Floarea
    Baicu, Andrei Mihai
    [J]. QUALITY-ACCESS TO SUCCESS, 2012, 13 (129): : 112 - 115
  • [32] Overview of Information Security Management-Based on Enterprise Risk Management
    She, Jing-Huai
    Zhang, Run-Qiang
    She, Yuan
    Hou, Bing-Xin
    [J]. INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND INFORMATION SECURITY (CNIS 2015), 2015, : 384 - 387
  • [33] A Practical Security Risk Analysis Process and Tool for Information System
    Chung, YoonJung
    Kim, InJung
    Lee, DoHoon
    [J]. JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2006, 2 (02): : 95 - 100
  • [34] An Administrative Model for Collaborative Management of ABAC Systems and its Security Analysis
    Jha, Sadhana
    Sural, Shamik
    Atluri, Vijayalakshmi
    Vaidya, Jaideep
    [J]. 2016 IEEE 2ND INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (IEEE CIC), 2016, : 64 - 73
  • [35] Application of the Analytic Network Process in Risk Assessment for Information Systems Security
    Wang, Xuan
    Sun, Lele
    [J]. PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON COOPERATION AND PROMOTION OF INFORMATION RESOURCES IN SCIENCE AND TECHNOLOGY(COINFO 10), 2010, : 285 - 289
  • [36] Collaborative risk method for information security management practices: A case context within Turkey
    Ozkan, Sevgi
    Karabacak, Bilge
    [J]. INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2010, 30 (06) : 567 - 572
  • [37] Systems theoretic process analysis of information security: the case of aadhaar
    Tarafdar, Pratik
    Bose, Indranil
    [J]. JOURNAL OF ORGANIZATIONAL COMPUTING AND ELECTRONIC COMMERCE, 2019, 29 (03) : 209 - 222
  • [38] Fuzzy Expert System of Information Security Risk Assessment on the Example of Analysis Learning Management Systems
    Abdymanapov, S. A.
    Muratbekov, M.
    Altynbek, S.
    Barlybayev, A.
    [J]. IEEE ACCESS, 2021, 9 : 156556 - 156565
  • [39] Statistical Process Control Based Chart for Information Systems Security
    Khan, Mansoor Shaukat
    Cui, Lirong
    [J]. SEVENTH INTERNATIONAL CONFERENCE ON DIGITAL IMAGE PROCESSING (ICDIP 2015), 2015, 9631
  • [40] The Automating Process of Information Security Management
    Sokolov, Sergey S.
    Alimov, Oleg M.
    Golubeva, Mariy G.
    Burlov, Vyacheslav G.
    Vikhrov, Nikolai M.
    [J]. PROCEEDINGS OF THE 2018 IEEE CONFERENCE OF RUSSIAN YOUNG RESEARCHERS IN ELECTRICAL AND ELECTRONIC ENGINEERING (EICONRUS), 2018, : 124 - 127