Information Lifecycle Security Risk Assessment: A tool for closing security gaps

被引:32
|
作者
Bernard, Ray
机构
[1] Ray Bernard Consulting Services, United States
关键词
data lifecycle risk analysis; electronic data security; electronic document management; enterprise data management; information lifecycle security risk; assessment information security risk assessment; physical data security; proprietary information protection; records and information management;
D O I
10.1016/j.cose.2006.12.005
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
News media continue to report stories of critical information loss through physical means. Most information security programs include physical protection for information system infrastructure, but not for the physical (non-electronic) forms of the information itself. Thus organizations have persistent critical information vulnerabilities that are not addressed by even the most extensive of information systems security programs. An Information Lifecycle Security Risk Assessment, as described in this paper, can be used to extend the reach of information security programs to encircle all forms of critical data from creation to destruction-even data in human memory form. Such an assessment can leverage existing data management and information systems security efforts. By incorporating both electronic and physical information elements, previously unaddressed information security gaps can be identified and mitigated. The end result should be a risk treatment plan which senior management can understand and approve, and which managers and security personnel can execute. (C) 2007 Elsevier Ltd. All rights reserved.
引用
收藏
页码:26 / 30
页数:5
相关论文
共 50 条
  • [41] Towards a Risk Assessment Matrix for Information Security Workarounds
    Slabbert, Eugene
    Thomson, Kerry-Lynn
    Futcher, Lynn
    [J]. HUMAN ASPECTS OF INFORMATION SECURITY AND ASSURANCE, HAISA 2021, 2021, 613 : 164 - 178
  • [42] An Improved Risk Assessment Method for SCADA Information Security
    Markovic-Petrovic, J. D.
    Stojanovic, M. D.
    [J]. ELEKTRONIKA IR ELEKTROTECHNIKA, 2014, 20 (07) : 69 - 72
  • [43] Information security risk assessment using the AHP method
    Zaburko, J.
    Szulzyk-Cieplak, J.
    [J]. IV INTERNATIONAL CONFERENCE OF COMPUTATIONAL METHODS IN ENGINEERING SCIENCE (CMES'19), 2019, 710
  • [44] An initial insight into Information Security Risk Assessment practices
    Wangen, Gaute
    [J]. PROCEEDINGS OF THE 2016 FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS (FEDCSIS), 2016, 8 : 999 - 1008
  • [45] Fuzzy risk assessment of information security threat scenario
    Ge, Hai-Hui
    Zheng, Shi-Hui
    Chen, Tian-Ping
    Yang, Yi-Xian
    [J]. Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2013, 36 (06): : 89 - 92
  • [46] The Validity of Information Security Risk Assessment Methods for Organizations
    Astakhova, L. V.
    [J]. SCIENTIFIC AND TECHNICAL INFORMATION PROCESSING, 2020, 47 (04) : 241 - 247
  • [47] Artificial Intelligence Techniques for Information Security Risk Assessment
    Basallo, Y. A.
    Senti, V. E.
    Sanchez, N. M.
    [J]. IEEE LATIN AMERICA TRANSACTIONS, 2018, 16 (03) : 897 - 901
  • [48] A new quantitative approach for information security risk assessment
    Asosheh, Abbas
    Dehmoubed, Bijan
    Khani, Amir
    [J]. ISI: 2009 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS, 2009, : 229 - 229
  • [49] Assessment of information security risk by support vector machine
    Dang, Depeng
    Meng, Zhen
    [J]. Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2010, 38 (03): : 46 - 49
  • [50] An Application of Probabilistic Risk Assessment to Information Security Audit
    Satoh, Naoki
    Kumamoto, Hiromitsu
    [J]. AIC '09: PROCEEDINGS OF THE 9TH WSEAS INTERNATIONAL CONFERENCE ON APPLIED INFORMATICS AND COMMUNICATIONS: RECENT ADVANCES IN APPLIED INFORMAT AND COMMUNICATIONS, 2009, : 436 - +