Risks Management relating to Information Systems Security. Assessment Methods for the Risk Level in Information Security

被引:0
|
作者
Baicu, Floarea [1 ]
Baicu, Andrei Mihai [2 ]
机构
[1] Hyper Univ Bucharest, Bucharest, Romania
[2] VIO TOP, Bucharest, Romania
来源
QUALITY-ACCESS TO SUCCESS | 2012年 / 13卷 / 129期
关键词
risk levels; acceptable risk level; tolerable risk; risk criteria; risk acceptability curve;
D O I
暂无
中图分类号
C93 [管理学];
学科分类号
12 ; 1201 ; 1202 ; 120202 ;
摘要
The paper presents several methods to assess in an organization the risk level concerning information security, qualitative, quantitative and combined methods as well as an original method based on the curve of risk acceptability. This method is mathematically proven by the drawing-up of parallel hyperbolic curves that intersect certain strictly fixed points, which mark the risk levels. All presented methods take into account the utilization value of the asset and the losses that the organization could encounter due to its destruction or effect on the business. Methods can be applied successively during various development stages of the information security management system, as the system security improves, while considering the own needs of the organization at a certain moment and the risk level accepted as tolerable risk. This paper also presents the risk criteria in relation to which the risk level significance is established.
引用
收藏
页码:112 / 115
页数:4
相关论文
共 50 条
  • [31] Comparison of Information Security Systems for Asymptotic Information Security Management Critical Information Infrastructures
    Erokhin, Sergey
    Petukhov, Andrey
    Pilyugin, Pavel
    PROCEEDINGS OF THE 28TH CONFERENCE OF OPEN INNOVATIONS ASSOCIATION FRUCT, 2021, : 89 - 95
  • [32] A framework and tool for the assessment of information security risk, the reduction of information security cost and the sustainability of information security culture
    Govender S.G.
    Kritzinger E.
    Loock M.
    Personal and Ubiquitous Computing, 2021, 25 (05) : 927 - 940
  • [33] Management of Information Security Risks in a Context of Uncertainty
    Azhmukhamedov, I. M.
    Vybornova, O. N.
    Brumshtein, Yu. M.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2016, 50 (08) : 657 - 663
  • [34] Information security assessment of SMEs as coursework - learning information security management by doing
    Ilvonen, I. (ilona.ilvonen@tut.fi), 1600, Journal of Information Systems Education (24):
  • [35] Information security climate and the assessment of information security risk among healthcare employees
    Kessler, Stacey R.
    Pindek, Shani
    Kleinman, Gary
    Andel, Stephanie A.
    Spector, Paul E.
    HEALTH INFORMATICS JOURNAL, 2020, 26 (01) : 461 - 473
  • [36] Information systems for supply chain management: uncertainties, risks and cyber security
    Boiko, Andrii
    Shendryk, Vira
    Boiko, Olha
    ICTE IN TRANSPORTATION AND LOGISTICS 2018 (ICTE 2018), 2019, 149 : 65 - 70
  • [38] Limitations of the Information Security Management System Assessment Approaches in the Context of Information Security Policy Assessment
    Corpuz, Maria Soto
    WMSCI 2010: 14TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL IV (POST-CONFERENCE EDITION), 2010, : 148 - 150
  • [39] Automation of Information Security Risk Assessment
    Akhmetov, Berik
    Lakhno, Valerii
    Chubaievskyi, Vitalyi
    Kaminskyi, Serhii
    Adilzhanova, Saltanat
    Ydyryshbayeva, Moldir
    INTERNATIONAL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2022, 68 (03) : 549 - +
  • [40] Information Security Risk Assessment in SCM
    Roy, Arup
    Gupta, A. D.
    Deshmukh, S. G.
    2013 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT (IEEM 2013), 2013, : 1002 - 1006