Implementing a risk management approach for optimizing information security systems

被引:0
|
作者
Petrescu, Marius [1 ]
Stegaroiu, Ion [1 ]
Braboveanu, Mioara [1 ]
Petrescu, Anca-Gabriela [1 ]
Sirbu, Nicoleta [1 ]
机构
[1] Valahia Univ Targoviste, Targoviste, Romania
关键词
Risk; risk assessment; risk management; information security; decision-making;
D O I
暂无
中图分类号
C93 [管理学];
学科分类号
12 ; 1201 ; 1202 ; 120202 ;
摘要
The globalization imposed a re-assessment of the security concepts, reconsideration and extension of the responsibilities in the field of information security. Organizations are continuously confronted with complex threats to information they handle and to the information systems they administer. The information security risk management emerged as an efficient and comprehensive procedure that complements the overall management of almost all aspects of our lives. Managers in very diverse types of organizations, with different missions, all incorporate risk assessment in their decision-making processes. At present, more and more managers in industry and government organizations are allocating a large part of their resources to the task of improving their understanding and approach to risk-based decision-making. The study revolves around the premises that information systems going through a systematic risk assessment and management process and associated decision-making steps would attain significantly better the information security objectives than systems that do not. The paper provides an overview of the theoretical approaches to information security risk management, as an essential step in developing effective information security systems. The article aims at advancing the current theories in order to develop adapted methods for different types of organizations.
引用
收藏
页码:304 / 309
页数:6
相关论文
共 50 条
  • [31] Towards a knowledge-sharing approach for Information Security Risk Management
    Papadaki, Katerina
    Polemi, Nineta
    KNOWLEDGE-BASED SOFTWARE ENGINEERING, 2008, 180 : 453 - +
  • [32] Optimizing Information Systems Security Design Based on Existing Security Knowledge
    Schilling, Andreas
    Werners, Brigitte
    ADVANCED INFORMATION SYSTEMS ENGINEERING WORKSHOPS, CAISE 2015, 2015, 215 : 447 - 458
  • [33] An Ontology-Based Security Risk Management Model for Information Systems
    Arogundade, Oluwasefunmi T.
    Abayomi-Alli, Adebayo
    Misra, Sanjay
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2020, 45 (08) : 6183 - 6198
  • [34] A New Evaluation Model for Information Security Risk Management of SCADA Systems
    Lin, Kuo-Sui
    2019 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL CYBER PHYSICAL SYSTEMS (ICPS 2019), 2019, : 757 - 762
  • [35] New Approach for Information Security Evaluation and Management of IT Systems in Educational Institutions
    Wang M.
    Wang Y.
    Wang T.
    Hou L.
    Li M.
    Journal of Shanghai Jiaotong University (Science), 2020, 25 (06) : 689 - 699
  • [36] An Ontology-Based Security Risk Management Model for Information Systems
    Oluwasefunmi T. Arogundade
    Adebayo Abayomi-Alli
    Sanjay Misra
    Arabian Journal for Science and Engineering, 2020, 45 : 6183 - 6198
  • [37] A Collaborative Process Based Risk Analysis for Information Security Management Systems
    Karabacak, Bilge
    Ozkan, Sevgi
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2010, : 182 - 192
  • [38] Including technical and security risks in the management of information systems: A programmatic risk management model
    Dillon, Robin L.
    Paté-Cornell, M. Elisabeth
    Systems Engineering, 2005, 8 (01) : 15 - 28
  • [39] Security through Information Risk Management
    Johnson, M. Eric
    Goetz, Eric
    Pfleeger, Shari Lawrence
    IEEE SECURITY & PRIVACY, 2009, 7 (03) : 45 - 52
  • [40] The Quantification Management of Information Security Risk
    Lao, Guoling
    Wang, Liping
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 10377 - 10380