Skip to main content
Top

2017 | OriginalPaper | Chapter

Using Dashboards to Reach Acceptable Risk in Statistics Data Centers Through Risk Assessment and Impact

Authors : Atif Amin, Raul Valverde

Published in: Engineering and Management of Data Centers

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

A well designed and integrated database used to present risk management information by using a dashboard interface supported by real time risk management data makes it easy for risk managers to reach a full understanding of the surrounding threats and allows them to find the proper and right controls to mitigate them. The chapter presents a case study for a statistics data center that shows that the calculation of total risk at the organization level is possible by using the proposed risk database that supports decision makers when threats hit the organization. The chapter also shows that presenting the risk level on a dashboard viewer makes risk level clearer for a decision maker in a statistics data center and assists in the creation of a tool to follow-up risk management since the time a threat hits till the time of its mitigation.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
go back to reference Almadhoob, A., Valverde, R.: Cybercrime prevention in the Kingdom of Bahrain via IT security audit plans. J. Theor. Appl. Inf. Technol. 65(1), 274–292 (2014) Almadhoob, A., Valverde, R.: Cybercrime prevention in the Kingdom of Bahrain via IT security audit plans. J. Theor. Appl. Inf. Technol. 65(1), 274–292 (2014)
go back to reference Calder, A., Watkins, S.: I. T. Governance. A Manager’s Guide to Data Security and ISO 27001/ISO 27002. Kogan Page, London (2008) Calder, A., Watkins, S.: I. T. Governance. A Manager’s Guide to Data Security and ISO 27001/ISO 27002. Kogan Page, London (2008)
go back to reference Dawson, C.W.: Projects in Computing and Information Systems: A Student’s Guide. Pearson Education, Harlow (2009) Dawson, C.W.: Projects in Computing and Information Systems: A Student’s Guide. Pearson Education, Harlow (2009)
go back to reference DeSouza, E., Valverde, R.: An employee-based risk management strategy for reducing security incidents in a Canadian PHIPA regulated environment. In: International Conference on Innovations in Computer Science and Information Technology (ICICSIT -2015), Hyderabad (2015) DeSouza, E., Valverde, R.: An employee-based risk management strategy for reducing security incidents in a Canadian PHIPA regulated environment. In: International Conference on Innovations in Computer Science and Information Technology (ICICSIT -2015), Hyderabad (2015)
go back to reference Harris, S.: CISSP All-in-One Exam Guide. McGraw-Hill Inc., New York (2008) Harris, S.: CISSP All-in-One Exam Guide. McGraw-Hill Inc., New York (2008)
go back to reference Khan, N.A., Valverde, R.: The use of RFID based supply chain systems in data centers for the improvement of the performance of financial institutions. Eng. Manage. Res. 3(1), 1–24 (2014)CrossRef Khan, N.A., Valverde, R.: The use of RFID based supply chain systems in data centers for the improvement of the performance of financial institutions. Eng. Manage. Res. 3(1), 1–24 (2014)CrossRef
go back to reference Kouns, J., Minoli, D.: Information technology risk management in entreprise environments. Wiley, Denvers (2010) Kouns, J., Minoli, D.: Information technology risk management in entreprise environments. Wiley, Denvers (2010)
go back to reference Landoll, D.: The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments. CRC Press, Boca Raton (2006) Landoll, D.: The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments. CRC Press, Boca Raton (2006)
go back to reference Nijburg, E., Valverde, R.: A business continuity monitoring model for distributed architectures: a case study. Int. J. Appl. Sci. Technol. 1(2), 5–14 (2011) Nijburg, E., Valverde, R.: A business continuity monitoring model for distributed architectures: a case study. Int. J. Appl. Sci. Technol. 1(2), 5–14 (2011)
go back to reference Stephens, J., Valverde, R.: Security of e-procurement transactions in supply chain reengineering. Comput. Inf. Sci. 6(3), 1–20 (2013) Stephens, J., Valverde, R.: Security of e-procurement transactions in supply chain reengineering. Comput. Inf. Sci. 6(3), 1–20 (2013)
go back to reference Stoneburner, G., Goguen, A.Y., Feringa, A.: Sp 800-30. risk management guide for information technology systems. National Institute of Standards and Technology, Gaithersburg (2002) Stoneburner, G., Goguen, A.Y., Feringa, A.: Sp 800-30. risk management guide for information technology systems. National Institute of Standards and Technology, Gaithersburg (2002)
go back to reference Tan, D.: Quantitative risk analysis step-by-step. SANS Institute, Bethesda (2002) Tan, D.: Quantitative risk analysis step-by-step. SANS Institute, Bethesda (2002)
go back to reference Wheeler, E.: Security risk management: building an information security risk management program from the ground up. Elsevier, Waltham (2011) Wheeler, E.: Security risk management: building an information security risk management program from the ground up. Elsevier, Waltham (2011)
go back to reference Wolden, M., Valverde, R., Talla, M.: The effectiveness of COBIT 5 information security framework for reducing cyber attacks on supply chain management system. IFAC-PapersOnLine. 48(3), 1846–1852 (2015)CrossRef Wolden, M., Valverde, R., Talla, M.: The effectiveness of COBIT 5 information security framework for reducing cyber attacks on supply chain management system. IFAC-PapersOnLine. 48(3), 1846–1852 (2015)CrossRef
Metadata
Title
Using Dashboards to Reach Acceptable Risk in Statistics Data Centers Through Risk Assessment and Impact
Authors
Atif Amin
Raul Valverde
Copyright Year
2017
DOI
https://doi.org/10.1007/978-3-319-65082-1_3

Premium Partner