Information Lifecycle Security Risk Assessment: A tool for closing security gaps

被引:32
|
作者
Bernard, Ray
机构
[1] Ray Bernard Consulting Services, United States
关键词
data lifecycle risk analysis; electronic data security; electronic document management; enterprise data management; information lifecycle security risk; assessment information security risk assessment; physical data security; proprietary information protection; records and information management;
D O I
10.1016/j.cose.2006.12.005
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
News media continue to report stories of critical information loss through physical means. Most information security programs include physical protection for information system infrastructure, but not for the physical (non-electronic) forms of the information itself. Thus organizations have persistent critical information vulnerabilities that are not addressed by even the most extensive of information systems security programs. An Information Lifecycle Security Risk Assessment, as described in this paper, can be used to extend the reach of information security programs to encircle all forms of critical data from creation to destruction-even data in human memory form. Such an assessment can leverage existing data management and information systems security efforts. By incorporating both electronic and physical information elements, previously unaddressed information security gaps can be identified and mitigated. The end result should be a risk treatment plan which senior management can understand and approve, and which managers and security personnel can execute. (C) 2007 Elsevier Ltd. All rights reserved.
引用
收藏
页码:26 / 30
页数:5
相关论文
共 50 条
  • [1] A framework and tool for the assessment of information security risk, the reduction of information security cost and the sustainability of information security culture
    Govender S.G.
    Kritzinger E.
    Loock M.
    [J]. Personal and Ubiquitous Computing, 2021, 25 (05) : 927 - 940
  • [2] Industrial Security: Detecting and closing IT security gaps in industrial plants
    GmbH, Koramis
    [J]. ZKG INTERNATIONAL, 2018, 71 (11): : 44 - 46
  • [3] Closing the gaps in air cargo security
    Moore, Sarah
    [J]. JOURNAL OF TRANSPORTATION SECURITY, 2015, 8 (3-4) : 115 - 137
  • [4] Research and Implementation of Intelligent Substation Information Security Risk Assessment Tool
    Zou, Zhenwan
    Hou, Yingsa
    Yang, Huiting
    Li, Mingxuan
    Wang, Bin
    Guo, Qingrui
    [J]. PROCEEDINGS OF 2019 IEEE 8TH JOINT INTERNATIONAL INFORMATION TECHNOLOGY AND ARTIFICIAL INTELLIGENCE CONFERENCE (ITAIC 2019), 2019, : 1306 - 1310
  • [5] Information security assurance lifecycle research
    XIE Cheng-shan State Key Laboratory of Information Security
    [J]. The Journal of China Universities of Posts and Telecommunications, 2007, (04) : 77 - 81
  • [6] Information security assurance lifecycle research
    XIE, Cheng-shan
    XUJIA, Gu-yue
    WANG, Li
    [J]. Journal of China Universities of Posts and Telecommunications, 2007, 14 (04): : 77 - 81
  • [7] Network Security Risk Level Estimation Tool for Information Security Measure
    Singh, Umesh Kumar
    Joshi, Chanchala
    [J]. 2016 IEEE 7TH POWER INDIA INTERNATIONAL CONFERENCE (PIICON), 2016,
  • [8] Information Security Risk Assessment in SCM
    Roy, Arup
    Gupta, A. D.
    Deshmukh, S. G.
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT (IEEM 2013), 2013, : 1002 - 1006
  • [9] Automation of Information Security Risk Assessment
    Akhmetov, Berik
    Lakhno, Valerii
    Chubaievskyi, Vitalyi
    Kaminskyi, Serhii
    Adilzhanova, Saltanat
    Ydyryshbayeva, Moldir
    [J]. INTERNATIONAL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2022, 68 (03) : 549 - +
  • [10] Information security climate and the assessment of information security risk among healthcare employees
    Kessler, Stacey R.
    Pindek, Shani
    Kleinman, Gary
    Andel, Stephanie A.
    Spector, Paul E.
    [J]. HEALTH INFORMATICS JOURNAL, 2020, 26 (01) : 461 - 473