Security risk analysis and management

被引:2
|
作者
Anton, Nicolae [1 ]
Nedelcu, Anisor [1 ]
机构
[1] Transilvania Univ Brasov, Fac Technol Engn & Ind Management, B Dul Eroilor 29, Brasov, Romania
关键词
D O I
10.1051/matecconf/201817808015
中图分类号
TE [石油、天然气工业]; TK [能源与动力工程];
学科分类号
0807 ; 0820 ;
摘要
The management system of informational security is a part of the management system of an organization, that approaches the management of risk from the point of view of the involved information, approach that is used in order to set, to implement, to function, to monitor, to revise, to maintain and to improve the informational security at the organizational level, referring to the progress of the processes required by the management of risk in order to guarantee the security of the information. The appreciation of the efficiency of the security system represents a difficult problem and it contains many elements of subjectiveness, because the analysis of the security risks of information implies using some interviewing techniques based on questionnaires provided by experts in security, that in most of the cases come from outside the organization. This study does not analyse the risk concept, it focuses more on the analysis and the risk management on the practical part using AHP method. Managing the risk and the security requirements are connected by a set of practices and management tools generally used in order to manage the security risk of information. It is essential that the tool and the model used should reflect the objective needs of the organization from the point of view of the management of risk.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] A Collaborative Process Based Risk Analysis for Information Security Management Systems
    Karabacak, Bilge
    Ozkan, Sevgi
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2010, : 182 - 192
  • [22] Risk Breakdown Structure and Security Space for Security Management
    Sato, Hiroyuki
    Tanimoto, Shigeaki
    Kanai, Atsushi
    2020 14TH IEEE INTERNATIONAL CONFERENCE ON SERVICE-ORIENTED SYSTEM ENGINEERING (SOSE 2020), 2020, : 7 - 16
  • [23] Security Risk Management in Complex Organization
    Sedinic, Ivan
    Perusic, Tamara
    2015 8TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2015, : 1331 - 1337
  • [24] Security through Information Risk Management
    Johnson, M. Eric
    Goetz, Eric
    Pfleeger, Shari Lawrence
    IEEE SECURITY & PRIVACY, 2009, 7 (03) : 45 - 52
  • [25] SECURITY RISK MANAGEMENT - CLOUD ENVIRONMENT
    Zboril, Martin
    STRATEGIC MODELING IN MANAGEMENT, ECONOMY AND SOCIETY (IDIMT-2018), 2018, 47 : 367 - 374
  • [26] Strategic risk management in building security
    Rohacs, Viktor J.
    PROGRESS IN SAFETY SCIENCE AND TECHNOLOGY, VOL 6, PTS A AND B, 2006, 6 : 2517 - 2523
  • [27] Security risk management in IoT environment
    Malik, Vinita
    Singh, Sukhdip
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2019, 22 (04): : 697 - 709
  • [28] Water infrastructure security risk management
    Danneels, JJ
    PROBABILISTIC SAFETY ASSESSMENT AND MANAGEMENT, VOL I AND II, PROCEEDINGS, 2002, : 309 - 314
  • [29] Security Risk Management Using Incentives
    Liu, Debin
    Li, Ninghui
    Wang, XiaoFeng
    Camp, L. Jean
    IEEE SECURITY & PRIVACY, 2011, 9 (06) : 20 - 28
  • [30] The Quantification Management of Information Security Risk
    Lao, Guoling
    Wang, Liping
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 10377 - 10380