Statistics Based Information Security Risk Management Methodology

被引:0
|
作者
Saluja, Upasna [1 ]
Idris, Dato Norbik Bashah [1 ]
机构
[1] Univ Technol UTM, Fac Comp, Kulmbach, Germany
关键词
Information Security Risk Assessment; Qualitative Risk Assessment; Quantitative; Statistical;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
On the one hand organizations are confronted with increasing sophistication, severity and number of threats and on the other hand organizations are getting even more dependent on IT which is rapidly changing with introduction of new technologies such as outsourcing, cloud, mobility and social media. Traditional risk management methodologies are proving ineffective in addressing these risks and in keeping pace with the complexity and dynamically changing IT environment. In such a situation, there is a need for an effective Risk Management methodology that can address diverse kinds of risks and leverage data from within the organization to analyze risks scientifically rather than through primitive and subjective methods based on rudimentary calculations. This paper presents a methodology which addresses these issues. Adapting from Medical and Finance fields, this methodology has generated information security risk indicators for the IT environment. These Risk Indicators are observed over a period of time leading to data driven factual process that inspires greater confidence among stakeholders. Drawing inspiration once again from the fields of medicine and finance, this methodology has conducted risk analysis statistically using second generation statistical technique Structured Equation Modeling ( SEM). The methodology provides a prediction model that predicts future risks scientifically. The Relative Risk Benchmark that this methodology has developed improves decision making when organizations need to prioritize risks, by providing a scientifically generated contribution of each risk towards the negative impact that organization faces. The path breaking information security risk management methodology cuts costs by enabling organizations to focus efforts and resources only on the risks that matter. This methodology inspires greater confidence in the results of the risk assessment since risks are assessed scientifically thus removing assessor bias while reducing the dependence of risk assessments on expert judgment.
引用
收藏
页码:117 / 123
页数:7
相关论文
共 50 条
  • [1] Study on information security risk management based Q-methodology
    Li, Xiaoyan
    Ning, Fangwei
    [J]. PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE AND ENGINEERING MANAGEMENT, 2011, : 384 - 390
  • [2] Development of an information security management system based on analysis methodology and risk identification in university libraries
    Guerra, Erick
    Neira, Harold
    Díaz, Jorge L.
    Patiño, Janns
    [J]. Informacion Tecnologica, 2021, 32 (05): : 145 - 156
  • [3] The Information Security Risk Management
    Semin, Valeriy G.
    Shmakova, Elena G.
    Los, Lexei B.
    [J]. PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE QUALITY MANAGEMENT,TRANSPORT AND INFORMATION SECURITY, INFORMATION TECHNOLOGIES (IT&QM&IS), 2017, : 106 - 109
  • [4] Information security and risk management
    Bodin, Lawrence D.
    Gordon, Lawrence A.
    Loeb, Martin P.
    [J]. COMMUNICATIONS OF THE ACM, 2008, 51 (04) : 64 - 68
  • [5] Overview of Information Security Management-Based on Enterprise Risk Management
    She, Jing-Huai
    Zhang, Run-Qiang
    She, Yuan
    Hou, Bing-Xin
    [J]. INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND INFORMATION SECURITY (CNIS 2015), 2015, : 384 - 387
  • [6] Study on Efficiency of Risk Management for Information Security Based on Transaction
    Lu, Zhigang
    Wang, Xiaozhen
    Liu, Baoxu
    Xu, Rongsheng
    [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, VOL II, 2009, : 356 - 360
  • [7] A design for information security risk evaluation and control platform based on audit Methodology
    Wei, Zhong
    Ye, Ming
    [J]. PROCEEDINGS OF THE 2007 CONFERENCE ON SYSTEMS SCIENCE, MANAGEMENT SCIENCE AND SYSTEM DYNAMICS: SUSTAINABLE DEVELOPMENT AND COMPLEX SYSTEMS, VOLS 1-10, 2007, : 2281 - 2285
  • [8] A Methodology for Mobile Network Security Risk Management
    Seify, Mahdi
    Bijani, Shahriar
    [J]. PROCEEDINGS OF THE 2009 SIXTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, VOLS 1-3, 2009, : 1572 - +
  • [9] Risk Management Methodology for Transport Infrastructure Security
    Makarova, Irina
    Yakupova, Gulnara
    Buyvol, Polina
    Abashev, Albert
    Mukhametdinov, Eduard
    [J]. INFRASTRUCTURES, 2022, 7 (06)
  • [10] Security through Information Risk Management
    Johnson, M. Eric
    Goetz, Eric
    Pfleeger, Shari Lawrence
    [J]. IEEE SECURITY & PRIVACY, 2009, 7 (03) : 45 - 52