A Collaborative Process Based Risk Analysis for Information Security Management Systems

被引:0
|
作者
Karabacak, Bilge [1 ]
Ozkan, Sevgi [2 ]
机构
[1] TUBITAK, Ankara, Turkey
[2] METU, Ankara, Turkey
关键词
ISO/IEC 27001:2005; information security; risk analysis; flow chart; process approach;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Today, many organizations quote intent for ISO/IEC 27001:2005 certification. Also, some organizations are en route to certification or already certified. Certification process requires performing a risk analysis in the specified scope. Risk analysis is a challenging process especially when the topic is information security. Today, a number of methods and tools are available for information security risk analysis. The hard task is to use the best fit for the certification. In this work we have proposed a process based risk analysis method which is suitable for ISO/IEC 27001:2005 certifications. Our risk analysis method allows the participation of staff to the determination of the scope and provides a good fit for the certification process. The proposed method has been conducted for an organization and the results of the applications are shared with the audience. The proposed collaborative risk analysis method allows for the participation of staff and managers while still being manageable in a timely manner to uncover crucial information security risks.
引用
收藏
页码:182 / 192
页数:11
相关论文
共 50 条
  • [41] A process framework for information security management
    Haufe, Knut
    Colomo-Palacios, Ricardo
    Dzombeta, Srdan
    Brandis, Knud
    Stantchev, Vladimir
    [J]. IJISPM-INTERNATIONAL JOURNAL OF INFORMATION SYSTEMS AND PROJECT MANAGEMENT, 2016, 4 (04): : 27 - 47
  • [42] Model based risk management of security critical systems
    Djordjevic, I
    Gan, C
    Scharf, E
    Mondragon, R
    Gran, BA
    Kristiansen, M
    Dimitrakos, T
    Stolen, K
    Opperud, TA
    [J]. RISK ANALYSIS III, 2002, 5 : 253 - 264
  • [43] A PROCESS APPROACH TO INFORMATION SECURITY MANAGEMENT
    VONSOLMS, R
    VONSOLMS, SH
    CARROLL, JM
    [J]. COMPUTER SECURITY, 1993, 37 : 385 - 399
  • [44] Study on Efficiency of Risk Management for Information Security Based on Transaction
    Lu, Zhigang
    Wang, Xiaozhen
    Liu, Baoxu
    Xu, Rongsheng
    [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, VOL II, 2009, : 356 - 360
  • [45] A Comprehensive Risk Management Approach to Information Security in Intelligent Transport Systems
    Vogt, Tom
    Spahovic, Edvin
    Doms, Thomas
    Seyer, Rainer
    Weiskirchner, Heinz
    Pollhammer, Klaus
    Raab, Thomas
    Rührup, Stefan
    Latzenhofer, Martin
    Schmittner, Christoph
    Hofer, Markus
    Bonitz, Arndt
    Kloibhofer, Carina
    Chlup, Sebastian
    [J]. SAE International Journal of Transportation Cybersecurity and Privacy, 2021, 4 (01):
  • [46] A New Evaluation Model for Information Security Risk Management of SCADA Systems
    Lin, Kuo-Sui
    [J]. 2019 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL CYBER PHYSICAL SYSTEMS (ICPS 2019), 2019, : 757 - 762
  • [47] A Nomological Network Analysis of Research on Information Security Management Systems
    Parra, Fernando
    Hall, Laura L.
    [J]. 2014 47TH HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS), 2014, : 4336 - 4345
  • [48] A Collaborative Information System Architecture for Process-Based Crisis Management
    Tahir, Omar
    Andonoff, Eric
    Hanachi, Chihab
    Sibertin-Blanc, Christophe
    Benaben, Frederick
    Chapurlat, Vincent
    Lambolais, Thomas
    [J]. KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 3, PROCEEDINGS, 2008, 5179 : 630 - +
  • [49] Improving the Automation of Security Information Management: A Collaborative Approach
    Aguirre, Idoia
    Alonso, Sergio
    [J]. IEEE SECURITY & PRIVACY, 2012, 10 (01) : 55 - 59
  • [50] Information security risk analysis model based on entropy
    Tang, Y. L.
    Xu, G. A.
    Niu, Y. X.
    Yang, Y. X.
    [J]. 2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 4, 2008, : 1146 - 1150