Skip to main content

2018 | OriginalPaper | Buchkapitel

20. Integrated Methodology for Information Security Risk Assessment

verfasst von : Ping Wang, Melva Ratchford

Erschienen in: Information Technology - New Generations

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Information security risk assessment is an important component of information security management. A sound method of risk assessment is critical to accurate evaluation of identified risks and costs associated with information assets. This paper reviews major qualitative and quantitative approaches to assessing information security risks and discusses their strengths and limitations. This paper argues for an optimal method that integrates the strengths of both quantitative calculation and qualitative evaluation for information security risk assessment.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Alberts, C., & Dorofee, A. (2002). Managing information security risks: The OCTAVE approach. Boston: Addison Wesley Longman Publishing Co., Inc.. Alberts, C., & Dorofee, A. (2002). Managing information security risks: The OCTAVE approach. Boston: Addison Wesley Longman Publishing Co., Inc..
3.
Zurück zum Zitat Anderson, R., & et al. (2013). Measuring the cost of cybercrime. The Economics of Information Security and Privacy. Springer. Anderson, R., & et al. (2013). Measuring the cost of cybercrime. The Economics of Information Security and Privacy. Springer.
4.
Zurück zum Zitat Blakley, B., McDerMott, E., & Geer, D. (2002). Information security is risk management. NSPW'0I, September 10–13th, 2002, Cioudcroll, New Mexico, 97–104. Blakley, B., McDerMott, E., & Geer, D. (2002). Information security is risk management. NSPW'0I, September 10–13th, 2002, Cioudcroll, New Mexico, 97–104.
5.
Zurück zum Zitat Bodin, L. D., Gordon, L. E., & Loeb, M. P. (2008). Information security and risk management. Communications of the ACM, 51(4), 64–68.CrossRef Bodin, L. D., Gordon, L. E., & Loeb, M. P. (2008). Information security and risk management. Communications of the ACM, 51(4), 64–68.CrossRef
6.
Zurück zum Zitat Ghazouani, M., et al. (2014). Information security risk Assessment — A practical approach with a mathematical formulation of risk. International Journal of Computer Applications, 103(8), 36–42.CrossRef Ghazouani, M., et al. (2014). Information security risk Assessment — A practical approach with a mathematical formulation of risk. International Journal of Computer Applications, 103(8), 36–42.CrossRef
7.
Zurück zum Zitat Gibson, D. (2015). Managing risk in information systems (2nd ed.). Burlington: Jones & Bartlett Learning. Gibson, D. (2015). Managing risk in information systems (2nd ed.). Burlington: Jones & Bartlett Learning.
8.
Zurück zum Zitat Kiran, K. V. D., et al. (2013). A comparative analysis on risk assessment information security models. International Journal of Computer Applications, 82(9), 41–47.CrossRef Kiran, K. V. D., et al. (2013). A comparative analysis on risk assessment information security models. International Journal of Computer Applications, 82(9), 41–47.CrossRef
9.
Zurück zum Zitat Karabacak, B., & Sogukpinar, I. (2005). ISRAM: Information security risk analysis method. Computer & Security, 24(2005), 147–159.CrossRef Karabacak, B., & Sogukpinar, I. (2005). ISRAM: Information security risk analysis method. Computer & Security, 24(2005), 147–159.CrossRef
13.
Zurück zum Zitat Suh, B., & Han, I. (2003). The IS risk analysis based on a business model. Information & Management, 41(2003), 149–158.CrossRef Suh, B., & Han, I. (2003). The IS risk analysis based on a business model. Information & Management, 41(2003), 149–158.CrossRef
14.
Zurück zum Zitat Vorster, A., & Labuschagne, L. (2005). A framework for comparing different information security risk analysis methodologies. Proceedings of SAICSIT 2005, pp. 95–103. Vorster, A., & Labuschagne, L. (2005). A framework for comparing different information security risk analysis methodologies. Proceedings of SAICSIT 2005, pp. 95–103.
15.
Zurück zum Zitat Wang, J. A. (2005). Information security models and metrics. Proceedings of the 43rd ACM Southeast Conference, March 18–20, 2005, Kennesaw, GA. 178–184. Wang, J. A. (2005). Information security models and metrics. Proceedings of the 43rd ACM Southeast Conference, March 18–20, 2005, Kennesaw, GA. 178–184.
16.
Zurück zum Zitat Whitman, M. E., & Mattord, H. J. (2008). Management of information security (2nd ed.). Boston: Thomson Course Technology. Whitman, M. E., & Mattord, H. J. (2008). Management of information security (2nd ed.). Boston: Thomson Course Technology.
Metadaten
Titel
Integrated Methodology for Information Security Risk Assessment
verfasst von
Ping Wang
Melva Ratchford
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-54978-1_20