Information security risk management terminology and key concepts

被引:0
|
作者
Michael Schmidt
机构
[1] Leibniz Supercomputing Centre of the Bavarian Academy of Sciences and Humanities,
来源
Risk Management | 2023年 / 25卷
关键词
Risk management; Information security; Terminology; Terms; Concepts; Frameworks;
D O I
暂无
中图分类号
学科分类号
摘要
Language is the foundation for any communication and the vocabulary used has a decisive influence on the ability of the communication partners to clearly understand each other. In Information Security Risk Management (ISRM), the terminology used is often dictated by industry standards and frameworks. However, there is no universally accepted terminology, which makes collaboration difficult for professionals and researchers alike. This publication compares the terminology defined by frequently used frameworks, such as ISO and NIST, in the field of ISRM. It examines the terms and inherent concepts of each terminology, compares the notion of risk and derives a concept diagram based on the most important key concepts. The result facilitates a common understanding of ISRM across frameworks and organisational boundaries, thus enables further research, discussion, intra- and inter-firm communication.
引用
收藏
相关论文
共 50 条
  • [41] Assets Dependencies Model in Information Security Risk Management
    Breier, Jakub
    Schindler, Frank
    [J]. INFORMATION AND COMMUNICATION TECHNOLOGY, 2014, 8407 : 405 - 412
  • [42] Verification, Validation, and Evaluation in Information Security Risk Management
    Fenz, Stefan
    Ekelhart, Andreas
    [J]. IEEE SECURITY & PRIVACY, 2011, 9 (02) : 58 - 65
  • [43] INFORMATION SECURITY OF THE BANK IN THE OPERATIONAL RISK MANAGEMENT SYSTEM
    Bezshtanko, D. V.
    [J]. FINANCIAL AND CREDIT ACTIVITY-PROBLEMS OF THEORY AND PRACTICE, 2012, 1 (12):
  • [44] Information Security and Risk Management: Trustworthiness and Human Interaction
    Phillips, Stephen C.
    Fair, Nicholas
    Erdogan, Gencer
    Tverdal, Simeon
    [J]. RESEARCH CHALLENGES IN INFORMATION SCIENCE, 2022, 446 : 821 - 822
  • [45] Information Security Risk Management in Critical Informative Systems
    Kiran, K. V. D.
    Reddy, L. S. S.
    Kumar, Velagapudi Pavan
    Dheeraj, Kalluri Krishna Sai
    [J]. 2014 CONFERENCE ON IT IN BUSINESS, INDUSTRY AND GOVERNMENT (CSIBIG), 2014,
  • [46] A Quantitative Model for Information-Security Risk Management
    Bojanc, Rok
    Jerman-Blazic, Borka
    [J]. ENGINEERING MANAGEMENT JOURNAL, 2013, 25 (02) : 25 - 37
  • [47] Agile Approach with Kanban in Information Security Risk Management
    Dorca, Vasile
    Popescu, Sorin
    Munteanu, Radu, Jr.
    Chioreanu, Adrian
    Peleskei, Claudius
    [J]. PROCEEDING OF 2016 IEEE INTERNATIONAL CONFERENCE ON AUTOMATION, QUALITY AND TESTING, ROBOTICS (AQTR), 2016, : 19 - 24
  • [48] USER PARTICIPATION IN INFORMATION SYSTEMS SECURITY RISK MANAGEMENT
    Spears, Janine L.
    Barki, Henri
    [J]. MIS QUARTERLY, 2010, 34 (03) : 503 - 522
  • [49] Statistics Based Information Security Risk Management Methodology
    Saluja, Upasna
    Idris, Dato Norbik Bashah
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2015, 15 (10): : 117 - 123
  • [50] Towards a Systemic Approach for Information Security Risk Management
    Naudet, Yannick
    Mayer, Nicolas
    Feltus, Christophe
    [J]. PROCEEDINGS OF 2016 11TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, (ARES 2016), 2016, : 177 - 186