Information security risk management terminology and key concepts

被引:0
|
作者
Michael Schmidt
机构
[1] Leibniz Supercomputing Centre of the Bavarian Academy of Sciences and Humanities,
来源
Risk Management | 2023年 / 25卷
关键词
Risk management; Information security; Terminology; Terms; Concepts; Frameworks;
D O I
暂无
中图分类号
学科分类号
摘要
Language is the foundation for any communication and the vocabulary used has a decisive influence on the ability of the communication partners to clearly understand each other. In Information Security Risk Management (ISRM), the terminology used is often dictated by industry standards and frameworks. However, there is no universally accepted terminology, which makes collaboration difficult for professionals and researchers alike. This publication compares the terminology defined by frequently used frameworks, such as ISO and NIST, in the field of ISRM. It examines the terms and inherent concepts of each terminology, compares the notion of risk and derives a concept diagram based on the most important key concepts. The result facilitates a common understanding of ISRM across frameworks and organisational boundaries, thus enables further research, discussion, intra- and inter-firm communication.
引用
收藏
相关论文
共 50 条
  • [1] Information security risk management terminology and key concepts
    Schmidt, Michael
    [J]. RISK MANAGEMENT-AN INTERNATIONAL JOURNAL, 2023, 25 (01):
  • [2] Information systems risk management: Key concepts and business processes
    Finne, T
    [J]. COMPUTERS & SECURITY, 2000, 19 (03) : 234 - 242
  • [3] Terminology for Process Safety, Security, and Risk Management
    Baybutt, Paul
    [J]. PROCESS SAFETY PROGRESS, 2014, 33 (04) : 405 - 406
  • [4] The Information Security Risk Management
    Semin, Valeriy G.
    Shmakova, Elena G.
    Los, Lexei B.
    [J]. PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE QUALITY MANAGEMENT,TRANSPORT AND INFORMATION SECURITY, INFORMATION TECHNOLOGIES (IT&QM&IS), 2017, : 106 - 109
  • [5] Information security and risk management
    Bodin, Lawrence D.
    Gordon, Lawrence A.
    Loeb, Martin P.
    [J]. COMMUNICATIONS OF THE ACM, 2008, 51 (04) : 64 - 68
  • [6] Security through Information Risk Management
    Johnson, M. Eric
    Goetz, Eric
    Pfleeger, Shari Lawrence
    [J]. IEEE SECURITY & PRIVACY, 2009, 7 (03) : 45 - 52
  • [7] The Quantification Management of Information Security Risk
    Lao, Guoling
    Wang, Liping
    [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 10377 - 10380
  • [8] Key Concepts of Systemological Approach to CPS Adaptive Information Security Monitoring
    Poltavtseva, Maria
    Shelupanov, Alexander
    Bragin, Dmitriy
    Zegzhda, Dmitry
    Alexandrova, Elena
    [J]. SYMMETRY-BASEL, 2021, 13 (12):
  • [9] Disasters and Security: Key Concepts
    Bruch, Carl
    [J]. IMPLICATIONS OF CLIMATE CHANGE AND DISASTERS ON MILITARY ACTIVITIES: BUILDING RESILIENCY AND MITIGATING VULNERABILITY IN THE BALKAN REGION, 2017, : 23 - 26
  • [10] Risk, gap and strength: key concepts in knowledge management
    McBriar, I
    Smith, C
    Bain, G
    Unsworth, P
    Magraw, S
    Gordon, JL
    [J]. KNOWLEDGE-BASED SYSTEMS, 2003, 16 (01) : 29 - 36