THE RISK ASSESSMENT: THE COMMON DENOMINATOR FOR PRIVACY AND SECURITY COMPLIANCE

被引:0
|
作者
Rose R.V. [1 ]
机构
[1] PLLC, Houston, TX
来源
Stahlbau | 2019年 / 60卷 / 05期
关键词
Risk assessment;
D O I
10.1080/07366981.2019.1685327
中图分类号
学科分类号
摘要
In the words of Ferris Bueller, “life moves pretty fast. If you don't stop and look around once in a while, you could miss it.” Although this quote is from the iconic 1980s movie, Ferris Bueller’s Day Off, its application to risk assessments is apropos. A risk assessment enables a person to “stop and look around” on an annual basis to make sure that technical, administrative and physical safeguards are not missed. New NIST guidance underscores the importance of risk mitigation in relation to both privacy and security by highlighting the role of the risk assessment in relation to both legal requirements and best practices. © 2019, © Copyright 2019 Taylor & Francis.
引用
收藏
页码:1 / 5
页数:4
相关论文
共 50 条
  • [41] Security Risk and Attacks in AI: A Survey of Security and Privacy
    Rahman, Md Mostafizur
    Arshi, Aiasha Siddika
    Hasan, Md Mehedi
    Mishu, Sumayia Farzana
    Shahriar, Hossain
    Wu, Fan
    2023 IEEE 47TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE, COMPSAC, 2023, : 1834 - 1839
  • [42] Compliance of MOOCs and OERs with the new privacy and security EU regulations
    Zdravkova, Katerina
    5TH INTERNATIONAL CONFERENCE ON HIGHER EDUCATION ADVANCES (HEAD'19), 2019, : 159 - 167
  • [43] Communications Surveillance: Privacy and Security at Risk
    Diffie, Whitfield
    Landau, Susan
    COMMUNICATIONS OF THE ACM, 2009, 52 (11) : 42 - 47
  • [44] Privacy Risk, Security, Accountability in the Cloud
    Theoharidou, Marianthi
    Papanikolaou, Nick
    Pearson, Siani
    Gritzalis, Dimitris
    2013 IEEE FIFTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), VOL 1, 2013, : 177 - 184
  • [45] Towards a Common Security and Privacy Requirements Elicitation Methodology
    Makri, Eleni-Laskarina
    Lambrinoudakis, Costas
    GLOBAL SECURITY, SAFETY AND SUSTAINABILITY: TOMORROW'S CHALLENGES OF CYBER SECURITY, ICGS3 2015, 2015, 534 : 151 - 159
  • [46] A New Security and Privacy Risk Assessment Model for Information System Considering Influence Relation of Risk Elements
    Wu Tianshui
    Zhao Gang
    2014 NINTH INTERNATIONAL CONFERENCE ON BROADBAND AND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS (BWCCA), 2014, : 233 - 238
  • [47] Mapping 'Security Safeguard' Requirements in a Data Privacy legislation to an International Privacy Framework: A Compliance Methodology
    Govender, I.
    2015 INFORMATION SECURITY FOR SOUTH AFRICA - PROCEEDINGS OF THE ISSA 2015 CONFERENCE, 2015,
  • [48] Security and privacy of digital economic risk assessment system based on cloud computing and blockchain
    Wenjin Jin
    Soft Computing, 2024, 28 : 2753 - 2768
  • [49] Confidentiality and Privacy Information Security Risk Assessment for Android-Based Mobile Devices
    Irwan
    Asnar, Yudistira
    Hendradjaya, Bayu
    2015 INTERNATIONAL CONFERENCE ON DATA AND SOFTWARE ENGINEERING (ICODSE), 2015, : 60 - +
  • [50] A Privacy, Security, Safety, Resilience and Reliability Focused Risk Assessment In a Health IoT System
    Nakamura, Emilio Tissato
    Ribeiro, Sergio Luis
    2019 GLOBAL IOT SUMMIT (GIOTS), 2019,