Information Asset Valuation Method for Information Technology Security Risk Assessment

نویسنده

  • Farhad Foroughi
چکیده

The information security strategic plan is necessarily comprehensive, including business processes, people, and physical infrastructure, as well as the information system. The Security risk evaluation needs the calculating asset value to predict the impact and consequence of security incidents. The return on security investment (ROSI) is defining the value for all invested in terms of security by determining the cost of assets that may disturb in security breaches and the cost of its impact. Knowledge is the source of many competitive advantages for businesses and it should protect against theft, misuse and disasters by adequate security controls. All elements that involved in the knowledge creation process are knowledge assets. An IPO model with a combination of Skandia and Balanced scorecard methods needs to develop a measurement system for knowledge asset value assessment. This model recognizes the role of customers and employees as the natures of knowledge and concentrates on a wide range of factors involved in organization such as processes, structures and development elements that has not been tried before. The model in addition includes structure capital variables that emphasized ICT factors those are investing knowledge into the company's competitive advantage.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Assets Dependencies Model in Information Security Risk Management

Information security risk management is a fundamental process conducted for the purpose of securing information assets in an organization. It usually involves asset identification and valuation, threat analysis, risk analysis and implementation of countermeasures. A correct asset valuation is a basis for accurate risk analysis, but there is a lack of works describing the valuation process with ...

متن کامل

Asset Valuation Method for Dependent Entities

Asset analysis and valuation are important parts of the information security risk management. Outputs they produce are used in the process of risk analysis that plays a key role in securing organization’s business processes. A correct analysis and valuation of assets should reveal not only their importance for the organization, but also their relationships and dependencies between each other. T...

متن کامل

ارائه الگویی برای ارزیابی ریسک آتش‌سوزی‌های عمدی

Background & Objectives : It is not possible to live without using fire. However, fire could destruct human properties in a short time. One of the most important types of fire is intentional fire. This type of fire has become a great problem for insurance companies, fire departments, industries, government and business in the recent years. This study aimed to provide a framework for risk assess...

متن کامل

The Delphi/Modified Delphi Technique: A Consensus Approach to Information Valuation

Recent advances in information technology management reflect the growing understanding that the most significant asset at risk is not hardware or facilities but, rather, the information that those assets service. An ongoing debate exists as to how—or whether—information can be valued. This chapter provides an overview and detailed guidance for one proven method of information valuation, the Del...

متن کامل

A Modest Proposal for Open Market Risk Assessment to Solve the Cyber-Security Problem

We introduce a model for a market based economic system of cyber-risk valuation to correct fundamental problems of incentives within the information technology and information processing industries. We assess the makeup of the current day marketplace, identify incentives, identify economic reasons for current failings, and explain how a market based risk valuation system could improve these inc...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008