Security risk analysis and management

被引:2
|
作者
Anton, Nicolae [1 ]
Nedelcu, Anisor [1 ]
机构
[1] Transilvania Univ Brasov, Fac Technol Engn & Ind Management, B Dul Eroilor 29, Brasov, Romania
关键词
D O I
10.1051/matecconf/201817808015
中图分类号
TE [石油、天然气工业]; TK [能源与动力工程];
学科分类号
0807 ; 0820 ;
摘要
The management system of informational security is a part of the management system of an organization, that approaches the management of risk from the point of view of the involved information, approach that is used in order to set, to implement, to function, to monitor, to revise, to maintain and to improve the informational security at the organizational level, referring to the progress of the processes required by the management of risk in order to guarantee the security of the information. The appreciation of the efficiency of the security system represents a difficult problem and it contains many elements of subjectiveness, because the analysis of the security risks of information implies using some interviewing techniques based on questionnaires provided by experts in security, that in most of the cases come from outside the organization. This study does not analyse the risk concept, it focuses more on the analysis and the risk management on the practical part using AHP method. Managing the risk and the security requirements are connected by a set of practices and management tools generally used in order to manage the security risk of information. It is essential that the tool and the model used should reflect the objective needs of the organization from the point of view of the management of risk.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] Defensive Dissuasion in Security Risk Management
    McGill, William L.
    2009 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS (SMC 2009), VOLS 1-9, 2009, : 3516 - 3521
  • [32] New Frontiers in Security Risk Management
    Sanchez, Luis Enrique
    Santos-Olmo, Antonio
    Mouratidis, Haralambos
    Fernandez-Medina, Eduardo
    IT PROFESSIONAL, 2023, 25 (03) : 61 - 67
  • [33] Research on Security Risk Management Process
    Wang, Peiqi
    Wen, Yu
    PROCEEDINGS OF THE INTERNATIONAL ACADEMIC CONFERENCE ON FRONTIERS IN SOCIAL SCIENCES AND MANAGEMENT INNOVATION (IAFSM 2018), 2018, 62 : 219 - 224
  • [34] Risk management: More security in adhesion
    Preusser, Werner
    Adhaesion Kleben und Dichten, 2008, (04): : 41 - 43
  • [35] Creating risk management strategies for IT security
    Southern, Steve
    Network Security, 2009, 2009 (03) : 13 - 16
  • [36] Security And Risk Management in Supply Chains
    Badr, Youakim
    Stephan, Jean
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2007, 2 (04): : 288 - 296
  • [37] Virtual enterprise risk and security management
    Feglar, T
    ISC'2005: 3rd Industrial Simulation Conference 2005, 2005, : 145 - 149
  • [38] Risk Management Theory Application in national information security risk control-Analysis of the relationship between classified protection and risk management
    Bi, Maning
    Jing, Yuan
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON AUTOMATION, MECHANICAL CONTROL AND COMPUTATIONAL ENGINEERING, 2015, 124 : 1830 - 1835
  • [39] New method for risk management in CRM security management
    Seify, Mahdi
    Third International Conference on Information Technology: New Generations, Proceedings, 2006, : 440 - 445
  • [40] From information security management to enterprise risk management
    Stoll, Margareth
    Lecture Notes in Electrical Engineering, 2015, 313 : 9 - 16