On the role of the Facilitator in information security risk assessment

被引:0
|
作者
Lizzie Coles-Kemp
Richard E. Overill
机构
[1] King’s College London,Department of Computer Science
来源
Journal in Computer Virology | 2007年 / 3卷 / 2期
关键词
Risk Assessment; Business Process; Information Security; Security Management; Business Objective;
D O I
10.1007/s11416-007-0040-6
中图分类号
学科分类号
摘要
In organisations where information security has historically been a part of management and for which the risk assessment methodologies have been designed there are established methods for communicating risk. This is the case for example in the banking and military sectors. However in organisations where information security is not embedded into management thinking and where the relationship between information security and the business is less clear-cut, communicating the risks to the business is less straightforward. In such circumstances it has been observed during field research that information security risk assessments frequently output findings to which the business cannot relate and the process is consequently often viewed as a “tick box” exercise, as opposed to one that provides real value to the business. In such a situation the information security risk assessment is divorced from the business process and not embedded into the organisation’s processes or thinking. The research for this paper was undertaken in order to identify what needs to be done in order to ensure that businesses of this type find the risk assessment process valuable in practice.
引用
收藏
页码:143 / 148
页数:5
相关论文
共 50 条