Taxonomy of information security risk assessment (ISRA)

نویسندگان

  • Alireza Shameli Sendi
  • Rouzbeh Aghababaei-Barzegar
  • Mohamed Cheriet
چکیده

Information is a perennially significant business asset in all organizations. Therefore, it must be protected as any other valuable asset. This is the objective of information security, and an information security program provides this kind of protection for a company’s information assets and for the company as a whole. One of the best ways to address information security problems in the corporate world is through a risk-based approach. In this paper, we present a taxonomy of security risk assessment drawn from 125 papers published from 1995 to May 2014. Organizations with different size may face problems in selecting suitable risk assessment methods that satisfy their needs. Although many risk-based approaches have been proposed, most of them are based on the old taxonomy, avoiding the need for considering and applying the important criteria in assessing risk raised by rapidly changing technologies and the attackers knowledge level. In this paper, we discuss the key features of risk assessment that should be included in an information security management system. We believe that our new risk assessment taxonomy helps organizations to not only understand the risk assessment better by comparing different new concepts but also select a suitable way to conduct the risk assessment properly. Moreover, this taxonomy will open up interesting avenues for future research in the growing field of security risk assessment.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Collective information structure model for Information Security Risk Assessment (ISRA)

Purpose – Information security has become an essential entity for organizations across the globe to eliminate the possible risks in their organizations by conducting information security risk assessment (ISRA). However, the existence of numerous different types of risk assessment methods, standards, guidelines and specifications readily available causes the organizations to face the daunting ta...

متن کامل

Information Security Risk Assessment: Towards a Business Practice Perspective

Information security risk assessments (ISRAs) are of great importance for organisations. Current ISRA methods identify an organisation’s security risks and provide a measured, analysed security risk profile of critical information assets in order to build plans to treat risk. However, despite prevalent use in organisations today, current methods adopt a limited view of information assets during...

متن کامل

Information Security Risk Analysis in komplexen Systemen - neue Herausforderungen und Lösungsansätze

Die Identifikation und Bewertung von Risiken, die die Informationssicherheit bedrohen (Information Security Risk Analysis, ISRA), ist in vielen Systemen von zentraler Bedeutung. Neue Technologien und Entwicklungen, wie etwa Industrie 4.0 oder das Internet der Dinge (Internet of Things, IoT) sowie generell die zunehmende Komplexität der IT-Systeme stellen neue Herausforderungen an die Risikoanal...

متن کامل

A Critical Study of Information Security Risk Assessment using Fuzzy and Entropy Methodologies

This paper critically surveys work on quantitative representation of security. Such quantified security has been presented as a general approach to precisely assess and control security. We classify a significant part of the work between some years respect to security perspective, target of quantification, underlying assumptions and type of validation A risk assessment method is introduced to t...

متن کامل

A Taxonomy of Privacy and Security Risks Contributing Factors

Identity management system(s) (IDMS) do rely on tokens in order to function. Tokens can contribute to privacy or security risk in IDMS. Specifically, the characteristics of tokens contribute greatly to security and privacy risks in IDMS. Our understanding of how the characteristics of token contribute to privacy and security risks will help us manage the privacy and security risks in IDMS. In t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Computers & Security

دوره 57  شماره 

صفحات  -

تاریخ انتشار 2016