A Framework For Aligning Information Security Risk Management Methods With It Governance Recommendations
نویسنده
چکیده
Organisations are under constant pressure from governments and industry to implement risk management methods. There are various information security risk management methods available that organisations can implement, and each has different approaches to identifying, measuring, controlling and monitoring the information security risks. Organisations find it difficult to select an information security risk management method; therefore there is a need for an objective comparative framework to evaluate information security risk management methods. This article provides a comparative framework based on CobiT’s Planning and Organisation Control Nine, Assess Risks, which can be used as evaluation criteria for information security risk management methods. Three prominent methods are evaluated using this comparative framework. The evaluated methods’ strengths and weaknesses as identified through the comparative framework are highlighted. This comparative framework provides an objective evaluation method to determine whether or not an information security risk management method is in line with information technology governance.
منابع مشابه
Critical Success Factors in implementing information security governance (Case study: Iranian Central Oil Fields Company)
The oil industry, as one of the main industries of the country, has always faced cyber attacks and security threats. Therefore, the integration of information security in corporate governance is essential and a governance challenge. The integration of information security and corporate governance is called information security governance. In this research, we identified "critical success factor...
متن کاملIT Security Governance: A Framework based on ISO 38500
ISO 38500 is an international standard for IT governance. The guidelines of ISO 38500 can also be applied at the IT security functional level in order to guide the governance of IT security. This paper proposes the use of a strategic information security management (ISM) framework to implement guidelines of ISO 38500. This approach provides several strategic advantages to the organization by 1)...
متن کاملGoverning Information System Security: Review of Approaches to Information System Security Assurance and Auditing
Over the past decade information system security issues has been treated mainly from technology perspective. That model of information security management was reactive, mainly technologically driven and rarely aligned to business needs. This paper goes a step further and considers it from the governance view, mainly aligning it with the risk management activities and stressing the necessity for...
متن کاملMicrosoft Word - WCE2013ISSecurityGovernance
Over the past decade information system security issues has been treated mainly from technology perspective. That model of information security management was reactive, mainly technologically driven and rarely aligned to business needs. This paper goes a step further and considers it from the governance view, mainly aligning it with the risk management activities and stressing the necessity for...
متن کاملAutonomic Framework for It Security Governance
With the recent service enhancements over the Internet, organisations are confronted with a growing magnitude of security intrusions and attacks. Current intrusion detection strategies have not been effective in the long term, as new and obfuscated security attacks keep emerging evading the surveillance mechanisms. With information technology (IT) playing a pivotal role in today’s organizationa...
متن کامل