Preview

Information Security Risk Management

Powerful Essays
Open Document
Open Document
2806 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Information Security Risk Management
Discussion
As observed at the 4th International Conference on Global e-Security in London in June 2008, Information Security Risk Management (ISRM) is a major concern of organizations worldwide. Although the number of existing ISRM methodologies is enormous, in practice a lot of resources are invested by organizations in creating new ISRM methodologies in order to capture more accurately the risks of their complex information systems. This is a crucial knowledge-intensive process for organizations, but in most cases it is addressed in an ad hoc manner. The existence of a systematic approach for the development of new or improved ISRM methodologies would enhance the effectiveness of the process (Papadaki et al, 2008). In this review, we examine existing ISRM methodologies, analyse trends in the development of new or improved methods and highlight gaps in research on the subject. The overarching research questions that form the foundations for this study were consequently formulated as follows:

RQ1: What information security risk management methodologies are currently being used in the industry?
RQ2: What evidence has been presented in ISRM research regarding the benefits and limitations of these methodologies?
RQ3: How much effort has been devoted to making these methodologies more SME-friendly?
RQ4: What are the prospects of the concept of Evidence-Based Risk Management in ISRM?

In responding to these research questions, our review beams the searchlight of critical analysis on the ISRM methodologies covered in existing literature with a view to providing a compendium for practitioners, researchers and other stakeholders in the ISRM arena.

The following ISRM methodologies were covered in the primary studies selected for this review:
……………..
……………..
……………..

With respect to RQ1, we limited our scope to ISRM methodologies on which primary studies had been undertaken from January 1995 to October 2012 on the premise that prior to the adoption of

You May Also Find These Documents Helpful

  • Powerful Essays

    Is4231 Week 5

    • 3436 Words
    • 14 Pages

    Evaluate the internal and external factors that influence the activities and organization of an information security program List and describe the typical job titles and functions performed…

    • 3436 Words
    • 14 Pages
    Powerful Essays
  • Powerful Essays

    Kudler Security Report

    • 8349 Words
    • 34 Pages

    References: Whitman, M., & Mattord, H. (2010). Management of Information Security (3rd ed.). Retrieved from https://ecampus.phoenix.edu/content/eBookLibrary2/content/eReader.aspx?…

    • 8349 Words
    • 34 Pages
    Powerful Essays
  • Good Essays

    RISK MANAGEMENT

    • 1958 Words
    • 15 Pages

    The purpose of this project is to open a new coffee shop in the local area of Covington, Ga. Charming Café will be owned by two partners, Allison Hatchell and Marshall Brumfield. This area has a high number of passing shoppers which is supported by a large and growing local population. There are a very few coffee shops in the area. Allison has experience in the restaurant business and Marshall in the commercial development industry there is an opportunity for great success. The coffee shop will serve breakfast, lunch, pastries, and variety of coffee from open to close. Operation schedule will be Monday through Saturday 5am-10pm and Sunday 9am-6pm. For continued success three positions are filled for COO, CFO, and CEO. The COO is responsible for planning and implementing the operations of the business. CFO is responsible for the financials within the company. While the CEO is in charge of all administration tasks for the company.…

    • 1958 Words
    • 15 Pages
    Good Essays
  • Good Essays

    Quantitative research is generally defined as four types: true experimental, quasi-experimental, correlational, and ex post facto. This paper gives a brief overview of the differences between experimental and…

    • 726 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Risk Management

    • 622 Words
    • 3 Pages

    The Integrated Distributors Incorporated is a publically traded company that is facing many challenges. The company’s Information technology infrastructure has been ignored and many of its operating locations are running outdated hardware and software, which greatly increases the risk to the network in relations to confidentiality, integrity, and availability. Because of the outdated hardware and software, the company suffered some network compromises through their JV internet site and it led to disclosures of sensitive and strategic information.…

    • 622 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Risk Management

    • 2295 Words
    • 10 Pages

    The metrics that best work to measure Xemba Translations performance on this project is project diagnostic metrics. While not all risks of a project can be mitigated, using this objective data based on these metrics will make a huge difference to mitigate risk. Using diagnostic project metrics is like using a thermometer to assess the projects current status. This can help eliminate or mitigate the issue before it becomes unmanageable at the close of the project. This can help avoid the, should have, could have, would have moments that may happen once the project closes and gets reviewed from a retrospective project metric. With the diagnostic project metric when an issue does arise a contingency plan can be created if there is a trend toward a major risk as well. Diagnostic project metrics use current project statistics to gage where the project stands throughout the work of the project. This allows the project manager the ability to make better decisions along the route of the project to mitigate risk. Metrics that help improve the decision making, help aid to lower the risk of any project. Diagnostic metrics are comparative measures. The metrics compare a baseline (usually set at time of planning the project) to current project actuals. The actuals are compared to an earned value figure that is determined by where the project should be at that exact moment in time according to the project schedule. These diagnostic metrics will use the actual cost, earned value, and planned value to evaluate schedule variance, schedule performance, cost performance, and cost variance. Schedule performance and schedule variance will evaluate the earned value against the planned value. This will help show if the project is currently on schedule, or if not is it over or under schedule and by how much. Cost variance and cost schedule will reveal how the project is performing compared to the current cost and planned budget. These values will help the project manager assess if the…

    • 2295 Words
    • 10 Pages
    Powerful Essays
  • Best Essays

    Asfd

    • 2616 Words
    • 11 Pages

    Mangram, A. J., Horan, T. C., Pearson, M. L., Silver, L. C., Jarvis, W. R. (1999). Guidelines for…

    • 2616 Words
    • 11 Pages
    Best Essays
  • Satisfactory Essays

    Risk Management

    • 607 Words
    • 3 Pages

    The candidate does not develop a social responsibility strategy for the chosen client that includes an environmental considerations and recommendations component.…

    • 607 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Risk Management

    • 1604 Words
    • 7 Pages

    According to the Risk Management section of Wells Fargo’s 2011 Annual Report, to be successful they manage and control three major business risks: credit, asset/liability, and market risk. As for this paper, I’m only going to discuss about their credit and interest rate risk, which is managed under their asset/liability section. Wells Fargo has continued to invest in its risk infrastructure especially since it is a larger and more complex company than before it merged with Wachovia. Wells Fargo’s Senior Executive Vice President and Chief Risk Officer, Michael Loughlin states that they have three lines of defense for managing the risks:…

    • 1604 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Risk Management

    • 426 Words
    • 2 Pages

    New technology can be good and bad at the same time. Often time’s new technology can open up new doors for hackers because new software will have to be installed with the new technology. Another threat can be new regulations and laws. The reason being, often times we may not know the new regulations and end up with a fine. Some common techniques to recover from an attack are risk mitigation and risk avoidance. Risk mitigation is when the use of various controls may reduce identified risks. The other is risk avoidance. This is making the choice not to take a risk from the beginning. Like, a company deciding to not do business depending on the organization.…

    • 426 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Evidence Based Practice

    • 11068 Words
    • 45 Pages

    of these mostly quantitative study designs is given in Table 6-1. For in-depth understanding of particular methods and their suitability for studying particular phenomena,…

    • 11068 Words
    • 45 Pages
    Powerful Essays
  • Better Essays

    References: Grow, L., Carr, J., Kodak, T., Jostad, C., & Kisamore, A. (2011.). A Comparison of Methods for…

    • 2066 Words
    • 9 Pages
    Better Essays
  • Better Essays

    Risk Management

    • 1271 Words
    • 6 Pages

    As risk manger it is brought to your attention that a Nurse Green in the OR is upset with her rotation schedule and what she feels is slander against her professional abilities. The OR supervisor when asked indicated Ms. Green, had complained to her that a physician, Dr. Ray, had made several passes at her, made suggestive remarks to her and asked her to go out with him repeatedly. Nurse Green indicated she had told him no but he still persisted. She is upset because the new rotation schedule is out for the OR and she was removed from the type of surgery she specializes in which includes all of Dr. Ray’s cases. When she asked why she was told the physician requested she not be in his rotation until she gained more experience. The nurse is upset and indicated she never had a problem with any of the surgeons prior to this and requests a meeting with the supervisor and risk manager/Human resource director.…

    • 1271 Words
    • 6 Pages
    Better Essays
  • Good Essays

    The information security systems are now highly preferred in the United Kingdom by nearly 75 percent of the top managers and as a result of this preference, such systems are now being greatly established in business. On average, about 4 to 5 percent of the IT budget of any company in UK is now spent on the information security system. All the companies are motivated towards putting into practice and using the best system for information security all around the world as there is a rise in the number…

    • 9583 Words
    • 39 Pages
    Good Essays
  • Best Essays

    E Views 6 User Guide I

    • 66484 Words
    • 266 Pages

    The authors and Quantitative Micro Software assume no responsibility for any errors that may appear in this manual or the EViews program. The user assumes all responsibility for the selection of the program to achieve intended results, and for the installation, use, and results obtained from the program.…

    • 66484 Words
    • 266 Pages
    Best Essays