Comparative Study of Information Security Risk Assessment Models
|
|
|
- Christina Tucker
- 10 years ago
- Views:
Transcription
1 Comparative Study of Information Security Risk Assessment Models Filipe Macedo and Miguel Mira da Silva Instituto Superior Técnico, Universidade Técnica de Lisboa, Av. Rovisco Pais, , Lisboa, Portugal Abstract There are numerous risk assessment models nowadays and many more emerging every day. They all have the same basic goal, but try to achieve it trough very different perspectives and addressing problems differently. Some of them can be applied to all kinds of risk, other are specific for particular risks. A particularly hazardous risk in today s global economy is Information Security. Information is a critical asset for organizations making information security risk very important. This study compares a choice of methods that allow an organization to assess their information security risk. The initial models went through two selection iterations before we end up with the final three fully studied models. The main purpose of the study is to compare and clarify the different activities, inputs and outputs required by each information security risk assessment models and also analyze which ones address information security risk effectively. The resulting information helps evaluating the models applicability to an organization and their specific needs. In order to verify and validate the conclusions taken from the theoretical study of the three final models, a case study was put into practice in a real organization. Keywords: Risk Assessment Models, Information Security Risk, Information Security Risk Assessment, Risk Assessment Models Comparison 1 Introduction Risk management is becoming one of the most prevalent business issues in our days and many companies regard it as a critical but challenging endeavour. It s, however, a very broad concept that embraces several types of risk. Risk can be everywhere, in business, finance, people, buildings, information technology and even in getting out of bed in the morning. Some of these risks have already been addressed and studied extensively but others only briefly. One risk that s particularly hazardous in today s global economy is Information Security Risk. This work is a detailed study of information security risk assessment models. The result will be a comparative and critic analysis of those models, and their significant concepts. 1.1 Motivation There are strong drivers for addressing risk management in a new perspective, especially for managing information security risk. Some of these factors are described below and summarized in Figure 1. Disregarding any of these factors can affect the organization s income, reputation, customer confidence, public image and brand. 1
2 1.1.1 Compliance A great number of the laws and regulations created recently in reaction to corporate scandals address the information security issue and pressure organizations to effectively assess information security risk and/or to implement security measures. Compliance is mandatory for most of these regulations. But note that compliance isn't the same as security. Securing information may make you compliant, but being compliant doesn't necessarily make you secure Information and information systems dependence Access to reliable information has become an indispensable component of conducting business, indeed, in a growing number of organizations, information is the business [1]. The livelihood of an organization is, therefore, linked to how well the availability, integrity, and confidentiality (the three main vectors of security) of the information is managed. On the other hand, the higher expectations concerning information systems integration, performance and availability are creating a degree of process and system complexity that is difficult to effectively manage. Mission success in these complex environments requires excellent corporate and IT governance as well as effective risk management [5] Change in organizations There are certain factors that induce change in organizations. Factors like the pressure to innovate, the pressure to cut costs, the implementation of new technologies. All these factors create new risks that need to be assessed and also change the information security risk context thus should be taken into consideration Exposure and boundaries Key drivers in the business environment, such as the globalization, have led to growing connectivity with clients, and increased outsourcing and partnering among organizations, causing greater exterior exposure and more ambiguous boundaries. This ambiguity creates multiple security contexts thus bringing greater risks to information Gap between business and information security Information security is a type of risk that intersects IT risk as well as business risk. But most companies have not yet effectively aligned IT risk management with their organization's overall riskmanagement strategy [10]. For that reason, information security risk tends to underestimated or even disregarded. These disconnect between IT and business can be enormously destructive, as we could see in the Société Générale case. SG lost $7.2 billion in early 2008, and brought to the fore the fact that business risk can be directly exposed through IT [7]. Information security risk needs to be met and managed regardless of ROI (Return on Investment). This means that nowadays it s not just about profitability in our globally competitive marketplace it s all about the intangible assets (information and reputation) that are at risk. 1.2 Problem Why is information security risk assessment so hard to achieve effectively? Here are two main reasons: Information security risk is different The main information security risk assessment problem is that information security risk is different from traditional risks. Information is one of the most challenging categories of critical assets for an organization to understand and define [2]. Therefore, identifying information security risk can be a quite difficult task, since few organizations have a comprehensive understanding of their information assets, threat vectors and security capabilities. Additionally, traditional risk assessment does not provide a method to accurately assess information security risks facing an ever changing, dynamic environment [8]. So it s clear that our old-world risk assessment model cannot keep up with permanent change of information security risks. Identification and evaluation of information security risks is a complicated, multi-dimensional process that involves the analysis of multiple technologies, people, processes and how they interoperate. 2
3 1.2.2 Variety of assessment models All the drivers referred above are turning risk assessment into a rapidly developing discipline with varied views and descriptions of what it involves, how it should be conducted and what it is for. Subsequently, many different risk assessment methods are emerging. There are general risk assessment methods, applicable to most kinds of risk, but also specific risk assessment methods, like information security risk assessment models, that address specific risks. A wide range of these risk assessment techniques can be applied to information security. Many suffer from being excessively complex, too time-consuming to apply, or from not addressing the full range of business and security issues that need to be considered or even from failing to involve business personnel in the risk assessment process. As a result, business managers have been inhibited from using information security risk assessment because most available techniques are hard to understand, produce results of uncertain value and require experienced risk assessment practitioners who are in short supply to apply them [8]. Due to this variety of existent models to assess information security risks and also due to the growing need to manage those risks, it s often hard for a company to determine which model best fits their specific needs. 2 Context 2.1 Introduction There has been a revolution and renewed interest in the corporate governance practices of modern corporations. Particularly due to the high-profile business scandals and organizational failures of the past decade where stakeholders suffered tremendous loss (e.g. AOL Time Warner, Tyco, Bear Stearns among others). In response to those corporate collapses, industry groups and regulators recently created a complex array of additional new laws and regulations designed to force improvement in corporate governance and on risk management [1]. The best example of those regulations is the USA Sarbanes- Oxley Act and the EU 8 th directive. 2.2 Risk Categories Organizations are exposed to various types of business risk. These risks can be categorized in a number of ways. In this work, the various risk categories are divided according to the purpose of the study. But despite the categorization of risks, organizations should be capable of dealing with all kinds of risks, irrespective of the way in which they are classified [15]. Financial Risk: In finance, risk is not an abstract uncertainty or possibility of failure or variability of the outcome. It s the probability that an investment's actual return will be different than expected. Operational Risk: arises from execution of business functions so it exists in every organization in a number of forms and exists regardless of the organization s size. As such, it is a very broad concept including Health and Safety Risk, Physical Risk, Fraud Risk, Human Resources Risk and Outsourcing Risk. Strategic Risk: the current and prospective impact on earnings or capital arising from adverse business decisions, improper implementation of decisions, or lack of responsiveness to industry changes. Reputation Risk: the current and prospective impact on earnings and capital arising from negative publicity regarding an institution s business practices [17]. Legal & Regulatory Compliance Risk: compliance risk is usually considered as part of Operational risk but nowadays it s gaining strength of his own. Information Systems Risk: is being increasingly recognized as a major category of business risk in their own right instead of being subsumed in other categories such as strategic and operational risks. 2.3 Risk Management In order to overcome the challenge of effectively dealing with uncertainty, and associated risk and opportunity, organizations have to address the specific problems that are most likely to cause the most 3
4 damage and evaluate them accurately (identify and assess risk). This balance between enhancing the capacity to build value while minimizing losses is Risk Management. Organizations that do not perform proper risk management could see their ability to conduct business damaged or even destroyed. Organizations that manage risk effectively and efficiently are more likely to achieve their objectives and do so at lower overall cost [20] Risk Management Cycle Risk management is a logical and systematic method of establishing the context, analyzing and evaluating the risks, implementing controls to treat the risks, communicating, monitoring and reviewing the risks, and maintaining and improving the system of risk controls (Figure 1). Context Risk Management context refers to the process of identifying information that may have an influence on the management of risk (goals, objectives, strategies, scope and parameters) [21]. Risk Assessment The main purpose of the risk assessment process is to identify risks and their potential impact. The risk assessment process includes the systematic approach of estimating the magnitude of risks (Risk Analysis) and the process of comparing the estimated risks against risk criteria to determine the significance of the risks (Risk Evaluation) [22]. Risk assessment is the part of the risk management process this work is focused in. Risk Response Once a risk has been assessed a business decision needs to be made on what, if any, action to take. The possible risk responses are to Accept, Avoid, Transfer or Reduce the risk. Controls The COSO [12] framework defines Control as the policies, procedures, practices, and organizational structures designed to provide reasonable assurance that the risk responses are effectively carried out. The countermeasures (controls) selected to manage risks must be balanced between productivity, cost, effectiveness of the countermeasure, and the value of the informational asset being protected. Residual Risk The remaining risk after the implementation of new or enhanced controls is called Residual Risk (or retained risk). Risk Reporting and Communication The continuous or iterative process that an organization conducts to provide, share and obtain information regarding the management of risk. Monitoring and Review The process of risk management shouldn t be a means to an end. It should be an ongoing iterative process that re-evaluates old risks and identifies new ones. 2.4 Information Security Risk Assessment Figure 1 Risk Management Cycle The term information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide confidentiality, integrity and availability [28]. Information security is not synonymous of computer security. Information security is concerned with the confidentiality, integrity and availability of information regardless of the form it may take. In information security, a risk can be defined as the probability that a particular threat-source will exercise (accidentally trigger or intentionally exploit) a particular information security vulnerability 4
5 and the resulting impact. Proper contextualized risk assessment is the best way to approach the organization s need for information security. Information security risk assessment is the process (part of Risk Management) that identifies and valuates the risks to information security by determining the probability of occurrence and the resulting impact [32]. It identifies threats, classifies assets and rates system vulnerabilities as it provides key information and guidelines to implement effective controls. Information risk assessment is divided in two activities: risk analysis and risk evaluation Information Security Risk Analysis Risk Analysis (or Identification) involves the identification of several aspects: Asset is defined as anything having value to an organization [30]. Threat is a potential cause of an unwanted incident, which may result in harm to a system or organization [30]. Vulnerability is a weakness of an asset or group of assets that can be exploited by one or more threats. [30] A requirement is a singular documented need of what a particular asset should be, do or respect. Impact can be defined as the severity of the consequences of an event or incident. In the context of information security, the impact is a loss of availability, integrity, and confidentiality of information Information Security Risk Evaluation Risk evaluation or estimation is the process used to assign values to consequences, their likelihood and to the level of risk [21]. One important thing to take into consideration is that these three variables rarely are independent from each other. In information security, there s a probable relation between asset value, impact and probability. For example, it s more likely a hacker will exploit a vulnerability that causes a bigger impact than one with low impact. Likewise, a valuable asset has more probability of being compromised than a valueless one. 3 Proposal This study proposes to clarify some of the most important information security risk assessment models The main goal is to provide practical information for organizations wanting to initiate or to enhance their risk management process. This will be achieved by studying and comparing in detail different models to assess information security. The study will identify what each model has to offer, what topics it addresses, and its main up and downsides. By clarifying what each model has best (their main advantages relatively to the other models) it will be easier to choose between them. The purpose of the work isn t the conception of a groundbreaking model, the purpose is to bring the best solutions together, and organize them in a practical and usable way. All the studied models have a common goal of estimating the overall risk value. However, there are no methods that will assist organisations in determining which model is the best to be employed within an organisation. The best way to choose between models is to compare them, using objective, quantifiable criteria. 3.1 Process The approach used to address the stated problem and to accomplish the above-mentioned objectives is divided into the following tasks: Widely explore the risk management theme and identify existing information security risk assessment models; Select the models that will be subject of detailed comparison based on concise criteria; Thorough study of each information security risk assessment model, aiming to produce a comparative analysis; Model comparison based in the theoretical study made until this point; Case study in a real organization (implementing the studied models); Comparison of the theoretical study and case study results. 5
6 4 Existing Models There are several models and methods with different approaches that help in the risk assessment process. This study will address the methods that support the risk assessment process and those which can be applied to information security. This chapter provides an overview of those methods, and a comparison that evaluates those different methodologies. The identified models are the following: OCTAVE, Mehari, MAGERIT, IT-Grundschutz, EBIOS, IRAM, SARA, SPRINT, ISO 27005, NIST SP800-30, CRAMM, MIGRA,MAR, ISAMM, GAO/AIMD-00-33, IT System Security Assessment, MG-2 and MG-3, Dutch A&K Analysis, MARION, Austrian IT Security Handbook, Microsoft s Security Risk Management Guide and Risk IT. Note that this is not an exhaustive list of methods due to the limited time and resources. 4.1 First selection iteration The first selection iteration pretends to exclude some of the models based in the following criteria: Is the model a method or just guidelines? Exclude if it isn t a method. Does the model specifically identify Information Security Risks? Exclude if it doesn t. Price and availability of documentation. Exclude if it is unavailable or too hard to obtain. Last review or update. Exclude if discontinued, obsolete or not recently updated/reviewed. The results of the model selection s first iteration are summarized in the following table (a green colour means the criterion was satisfied, red means it wasn t): Method or Identifies IS 2nd Name Documentation? Last Review Guideline? Risks? Iteration? OCTAVE Method Yes Free Up-to-date Yes Mehari Method Yes Free Up-to-date Yes MAGERIT Method Yes Free Up-to-date Yes IT-Grundschutz Method Yes Free Up-to-date Yes EBIOS Method Yes Free Up-to-date Yes IRAM Method Yes Up-to-date Yes Available only to ISF SARA Method Yes Discontinued No Members SPRINT Method Yes Discontinued No ISO Guideline Yes Available Up-to-date No NIST SP Guideline Yes Free Up-to-date No CRAMM Method Yes Expensive Up-to-date No MIGRA Method Yes Expensive Up-to-date No MAR Guideline No Free Up-to-date No ISAMM Method Yes Unavailable N/A No GAO/AIMD Guideline Yes Free N/A No IT System Security Assessment Guideline Yes Unavailable N/A No MG-2 and MG-3 Guideline Yes Unavailable N/A No Security Risk Management Guide Guideline Yes Unavailable N/A No Dutch A&K Analysis Method Yes Unavailable Obsolete No MARION Method Yes Unavailable Obsolete No Austrian IT Security Handbook Guideline Yes Unavailable Up-to-date No Microsoft's security risk management guide Guideline Yes Free Up-to-date No RiskIT Framework No Available N/A No Table 1 First iteration criteria applied to each model As a result of applying the 4 criteria, 16 of the 22 initial models were excluded. These models didn t comply with one or more criterion and for that reason they won t be studied in more depth. Nonetheless, six models were in conformance with all the criteria. These models are: Octave, Mehari, Magerit, IT-Grundschutz, Ebios and IRAM. Only these models will be considered after this point. 6
7 OCTAVE EBIOS MAGERIT IRAM Used in many EU member states and non- EU member states Used in many EU member states and non- EU member states Used in many EU member states and non- EU member states Used in many EU member states IT- Grundschutz Mehari 4.2 Second selection iteration Despite having reduced the initial universe of models to almost one fourth, six is still a significant number of models to study in detail (considering the existent time and people limitations of this work). Therefore, the universe of models will again be reduced through another set of criteria. The 5 selected criteria are the following: Complexity, Effort and preparation (this criterion tries to reflect the level of preparation, information, effort and skills needed to implement the model, and the level of detail and scope of the risk analysis results) Approach of the model (the risk assessment approach each model advocates (e.g. selfassessment, interviews, workshops) Tool (if the model provides supporting tools and how can we obtain them) Origin (in this study three possible sources for a model were considered: Academic, Governmental or Commercial) Geographical spread (countries in which the model is known to have been implemented) The results of the model selection s second iteration are summarized in the following table (the green coloured table lines are the models that satisfied the selected criteria): 1. Complexity 1 (Low) 2 (Medium) 2 (Medium) 2 (Medium) 2. Approach 3. Tool 4. Origin Workshop-style, collaborative setting and is supported with guidance, worksheets, and questionnaires, which are included in the method. Self assessment and discussions in a mixed work group (managers, IT and users) The method suggests more than one technique to calculate risk Workshop based (typically conducted with business and IT staff) No software tool but has supporting documentation Free tool Free tool Free tool (for members) Academic Governmental Governmental Commercial 3 (High) Self Assessment Paid tool Governmental 3 (High) Bases its analysis on formulas, parameters, and a knowledge database; Audits are carried out to identify potential vulnerabilities; Paid tool Commercial Table 2 Criteria applied to each of the second iteration model 5. Geographical spread Used mainly in the USA Used in many EU member states and non- EU member states The criteria used in the first iteration were objective and allowed to immediately exclude some of the models. The selection was, therefore, a straightforward and easy to understand process. However, this second part of the selection wasn t as simple as the first. The six considered models in the second iteration were all excellent candidates to the next phase of the study, and for that reason, selecting three out of the six required more complex criteria. Most of these criteria were much more subjective and unquantifiable, making the final selection harder. The strategy adopted in this case was to select the models that, together, formed a representative sample of the existent models universe. Therefore, the selected models should come from different backgrounds and should have different approaches and complexities. 4.3 Comparative Study The study of the three final models aims to compare in greater detail the three different approaches. The new set of criteria is: Concept definition; Approach to information security risk assessment; Results and output; Complexity. The result of applying the criteria to the 3 models is described below. According to the first criterion used in this comparison, concept definitions, the three models don t diverge. Therefore, this criterion doesn t help to differentiate the three models. The second criterion, the information security risk assessment approach of each model, is much more complex than the first one and starts to differentiate the models from each other. The simpler approach is, without a doubt, the one advocated by OCTAVE. It takes a business perspective and has almost no technical details. It s suited for small teams and doesn t require 7
8 extensive organisational involvement, expertise, or input. It s an intuitive and quick approach to assess risk that only produces the essential information. One of the benefits of this approach is its adaptable measures, which can be customized to organizational needs. IRAM s approach is more complex than OCTAVE s, it s more rigorous and detailed. The main focus are information systems, therefore this model is more technical than OCTAVE. Nonetheless, it s still mainly business-centred, and its approach is workshop based. Information is gathered through face-toface interviews and questionnaires. This process oriented approach provides plenty of supporting tools and documentation, making the whole process easier to use and more practical. Similarly to OCTAVE, IRAM is also a very flexible model, easily adaptable to different organizations. IT-Grundschutz is based in a more traditional risk analysis approach (identify threats, assign a likelihood of occurrence, and select the appropriate IT security measures), but in IT-Grundschutz this task has already been completed for each module. IT-Grundschutz modules include lists of relevant threats and required countermeasures in a relatively technical level. IT-Grundschutz s approach is therefore reduced to a target versus actual comparison between the security measures recommended in the IT-Grundschutz Catalogues and those already implemented. Despite all the simplifications describe above, IT-Grundschutz is a very complex model that helps an organisation to establish an Information Security Management System (ISMS). Note that in this work, only the part regarding the risk assessment was considered. The third criterion used to compare the three models was the information resulting from applying each information security risk assessment model. As it was described before, OCTAVE is a simple and straightforward model and consequently doesn t produce much information. The output of this model is just the essential information to understand what the critical assets are and what the main risks to those assets are. The two other models, IRAM and IT-Grundschutz, also provide this essential information, but in greater detail and also in different ways. Besides offering the same information that OCTAVE offers in greater detail, IRAM s approach also helps to determine the criticality and importance of information systems. It produces detailed reports with threats, vulnerabilities and security requirements. IT- Grundschutz, as it was explained before, can be characterized as a target versus actual comparison. Security measures that are found to be missing or inadequately implemented reveal security deficits (risks). IT-Grundschutz calculates the IT security level of the organisation and provides very detailed technical recommendations. The fourth and last criterion, complexity, also differentiates models from each other. Under this criterion, models were characterized according to 5 different aspects. OCTAVE needs little preparation compared to the other two models. It can be completed with small teams of people and few technical skills, in a small period of time. IRAM needs just slight more preparation than OCTAVE but with a greater level of detail. It also needs a higher level of expertise. But despite more complex that OCTAVE, IRAM can also be completed rather quickly. IT-Grundschutz is a very detailed model (it has more than 3000 pages of documentation). The amount of information needed to start the process is much higher than any of the other two models, but after this task is completed, the process becomes much more straightforward. This model also requires much more experience and knowledge than the other two, and will involve more resources and time. 4.4 Summary This section showed the various steps taken to come up with a sustained comparison. The first step was to select three information security risk assessment models from the initial group of 22 suitable models identified in the research phase. Different and relevant criteria were used in the two iterations of the selection process. The next step was the detailed analysis and comparison of the three chosen models according to detailed criteria. The models were first compared by the assessment of similarities and differences between the models definition of general concepts. After this, the risk assessment approaches, the output and the complexity of each model are also compared. 5 Practical application of the models The three information security risk assessment models under study were applied in a real organization. This practical application of the models complements and brings added value to the theoretical study previously initiated by helping to better compare and analyze each of the three models. The case study took place in a public hospital (Centro Hospitalar de Lisboa Ocidental), during the months of April, May and June. 8
9 5.1 Activities 1. Asset profiling In this activity a profile for the target information assets was created and the information and business processes that are to be protected were identified. 1.1 Identification of critical information assets The critical assets selected were the hospital s two main information systems: Sonho and HCIS (HealthCare Information System). 1.2 Gathering key information about each information asset necessary to begin the risk assessment process 2. Assessment of impacts and protection requirements 2.1 Define impact areas/damage scenarios according to the organization The output is a Business Impact Table with rating criteria and areas prioritized from most to least important. The identified impact areas are: Reputation and Public Image, Health, Productivity/Performance and Financial. 2.2 Assessment of business impacts and protection requirements for each information asset on each impact area 3. Threat assessment 3.1 Identification of threat scenarios for each asset 3.2 Determine overall threat ratings 3.3 Assess factors affecting vulnerability and determine overall vulnerability rating 4. Risk Identification 4.1 Calculation of the risk score 5.2 Results This section presents the final results of the experience summarized for an overall perspective. HCIS Confidentiality Integritiy Availability SONHO Confidentiality Integritiy Availability Very High High Low Low Very High High Table 3 and 4 Security Requirements Quantification and evaluation of the top priority risks: Information Risk Rating Summary OCTAVE IRAM IT-Grundschutz HCIS SONHO HCIS SONHO HCIS SONHO Global Deliberate External Attack Medium Low X Medium Internal Misuse and Abuse Medium Medium X Medium Theft Low Low - Low Service Interruption / Technical failure Medium High X High Force Majeure Very Low Medium - Low Human Error High Very High X High 6 Conclusion 6.1 Evaluation In the practical experience we considered two critical information assets (Sonho and HCIS). The objective was to apply the three models to better compare the approaches and final results. The first phase of this experience was to analyse what information and input each of the three models would need and then collect all that information. This task is the most time consuming of the whole process. The practical experience proved right most of the conclusions taken from the theoretical study regarding the approach, output and complexity of the models. 9
10 In my personal opinion, without regarding an organization s specific needs, IRAM is the approach that better conciliates usability, complexity, flexibility and final results. OCTAVE, despite simple and quick, just produces the essential information with no great detail. On the other hand we have IT- Grundschutz that calculates the IT security level of the organisation and provides very detailed technical recommendations, but at a very high cost (time, expertise and resources). The practical experience helped getting to the conclusion that IRAM s approach helps to determine the criticality and importance of information systems and produces detailed reports with threats, vulnerabilities and security requirements in a relatively effortless process. The application of the three models at the same time didn t facilitate the comparison. However, the practical implementation of the three models helped to clarify what information is needed, how it s used and processed and what is the resulting information. 6.2 Final Comments Risk assessment is an essential practice to find out what might go wrong in an organisation, and also an unquestionably worthwhile subject to explore. Throughout this study I tried to simplify risk assessment concepts and methods in order to make this task more straightforward and easier to approach. This document started by introducing risk management, the broader concept where risk assessment fits in, and explaining the factors driving the growing need to manage risk. After this introduction, the particular set of problems and difficulties related to information security risk assessment were exposed. The state-of-the-art in information security risk assessment was the next step to contextualize the reader, followed by the actual proposal. The proposal clarifies the study s purpose and gives insight on how its objectives are going to be achieved. The second part of the study describes how the study was carried out, explaining the methods used to select, analyse and compare the studied models. This part of the study also describes the practical experience carried out in a real organization during the study. This experience provides a practical example of the application of the information security risk assessment models in a real organisation. This study produced a comparative and critic analysis of three information security risk assessment models, as it was proposed. It explained the models approaches and clarified the advantages and disadvantages of each one of them. Hopefully the information produced will help to shed light on the information security risk assessment topic and assist organisations wanting to initiate a risk assessment process. The final results and conclusions of this comparative study represent a valuable and constructive contribution to knowledge. 6.3 Future Work A considerable number of ideas that can lead to future work in this area were generated while I was working in this project. For example, a lot more models can still be studied in more depth so they can also be compared to the three models addressed in this study. Models can also be compared with different criteria so that overlaps, redundancies, inconsistencies, gaps, and conflicts among the studied models can be tracked and identified. Models should be applied in different organizations and in a larger period of time so results from different contexts can be analysed and better evaluated. Testimonials of practical applications could also be collected and compared. The results of having an information security risk assessment process implemented can also be compared to the theoretical benefits already presented in this work. Other path that can be explored is the creation of a methodology or mechanism that explicitly indicates which model is best to a particular organization. A function that considers the organization s specific needs and characteristics and that, based on those parameters, points towards the most compatible model. 10
11 7 References 1.Information Security Governance: Guidance for Boards of Directors and Executive Management, 2nd Edition. IT Governance Institute (2006) 2.Quick Study: Risk Management. Computerworld (January 17, 2000) 3.Sun, L.., Srivastava, R., Mock, T.: An Information Systems Security Risk Assessment Model under Dempster-Shafer Theory of Belief Functions. Journal of Management Information Systems, Vol. 22, No. 4, Spring 2006: (2006) 4.Steps for managing risk. Computerworld (November 10, 2005) 5.Alberts, C.: Common Elements of Risk. Technical Note CMU/SEI-2006-TN-014, Carnegie Mellon University (April 2006) 6.Granneman, J.: Death of a risk assessor. SearchSecurity.com (November 19, 2008) 7.Sayer, P., Wailgum, T.: What You Can Learn about Risk Management from Societe Generale. CIO (April 17, 2008) 8.SPRINT: Risk Analysis For Information Systems, User Guide, Version 1.0. The European Security Forum (1997) 9.Bayne, J.: An Overview of Treath and Risk Assessment. SANS Institute, as part of the Information Security Reading Room (2002) 10.Managing Information Technology Risk A Global Survey for the Financial Services Industry, Ernst & Young 11.IT Governance Institute, Board Briefing on IT Governance, 2nd Edition, USA (2003), 12.Enterprise Risk Management Integrated Framework, Executive Summary. Committee of Sponsoring Organizations of the Treadway Commission (COSO). (September 2004) 13.Basel II: International Convergence of Capital Measurement and Capital Standards: a Revised Framework. Basel Committee on Banking Supervision. Bank for International Settlements, Switzerland (June 2004) 14.MAR, Modelo de Avaliação de Riscos. Banco de Portugal, DSB (2007) 15.BS :2006: Information security management systems Part 3: Guidelines for information security risk management. British Standard Institute (2006) ISBN Wilsher, R., King, M.: Alignment of Information Security Assessment Best Practices. Proceedings of the 11th Colloquium for Information Systems Security Education, Boston University (2007) 17.Fombrun, Foss: Developing a Reputation Quotient, Federation of European Risk Management Associations (FERMA), 19.European Union Regulation 2004/460, 20.AS/NZS 4360:199: Risk Management. Standards Association of Australia (1999) 21.ISO/IEC Guide 73: Risk Management Vocabulary. ISO, Geneva (2007) 22.ISO/IEC :2005: Information technology Security techniques - Code of practice for information security management, 2 nd Edition. ISO, Geneva (2005) 23.CobiT 4.1, IT Governance Institute, USA (2007) 24.A Risk Management Standard. AIRMIC, ALARM, IRM, London (2002) 25.UK Financial Services Authority, 26.European Union MEMO/07/286, e=en 27.Brewer, D.: Risk Assessment Models and Evolving Approaches. IAAC workshop, Senate House, London (2000) 28.United States Code, Title 44, Chapter (b)(1) (2006) 29.Lambo, T.: ISO/IEC 27001: The Future of infosec certification. ISSA Journal (November 2006) 30.ISO/IEC :2004: Information technology Security techniques - Management of information and communications technology security -- Part 1: Concepts and models for information and communications technology security management. ISO, Geneva (2004) 31.Krause M., Tipton H.: Handbook of Information Security Management. CRC Press LLC Stoneburner, G., Goguen, A., Feringa, A.: NIST Risk Management Guide for Information Technology Systems. NIST, USA (2002) 33.Marinos, L.: Risk Management at ENISA. A road map - from objectives to achieve practical results. ENISA, Greece (2005), Philip L. Campbell, Jason E. Stamp: A Classification Scheme for Risk Assessment Methods, SANDIA Report (2004) 35. Jeremy Hilton,Pete Burnap and Anas Tawileh: Methods for the identification of Emerging and Future Risk, ENISA (2007) 36.Inventory of risk assessment and risk management methods. ENISA ad hoc working group on risk assessment and risk management (2006) 37. W.G. Bornman L. Labuschagne: A Comparative Framework for Evaluating Information Security Risk Management Methods. Standard Bank Academy for Information Technology, Rand Afrikaans University (2004) 38.Introducing OCTAVE Allegro: Improving the Information Security Risk Assessment Process Richard A. Caralli, James F. Stevens, Lisa R. Young, William R. Wilson, May 2007 TECHNICAL REPORT CMU/SEI Adrian Munteanu, A., Ioan A.: Information Security Risk Assessment: The Qualitative Versus Quantitative Dilemma. Managing Information in the Digital Economy: Issues & Solutions Shawn A. Butler, Paul Fischbeck: Multi-Attribute Risk Assessment. Carnegie Mellon University 42.APEC Information Security Standards Handbook, Final Draft. 43.Ding Tan: Quantitative Risk Analysis Step-By-Step. SANS Institute (2003) 44.Business Impact Analysis and Risk Assessment for Information Assets: General Information & Process Description. Georgia Institute of Technology, Department of Internal Auditing (2003) 45.Nicholas G. Carr: IT Doesn t Matter. Harvard Business Review (May 2003) 46.IT-Grundschutz Catalogues: Version Federal Office for Information Security (2006) 11
Inventory of risk assessment and risk management methods
ENISA ad hoc working group on risk assessment and risk management Inventory of risk assessment and risk management methods Deliverable 1 Final version Version 1.0 30/03/2006 Content Preamble...4 1. Executive
Information security risk management using ISO/IEC 27005:2008
Information security risk management using ISO/IEC 27005:2008 Hervé Cholez / Sébastien Pineau Centre de Recherche Public Henri Tudor [email protected] [email protected] March, 29 th 2011 1
Methods Commission CLUB DE LA SECURITE DE L INFORMATION FRANÇAIS. 30, rue Pierre Semard, 75009 PARIS
MEHARI 2007 Overview Methods Commission Mehari is a trademark registered by the Clusif CLUB DE LA SECURITE DE L INFORMATION FRANÇAIS 30, rue Pierre Semard, 75009 PARIS Tél.: +33 153 25 08 80 - Fax: +33
A Structured Comparison of Security Standards
A Structured Comparison of Security Standards Kristian Beckers 1, Isabelle Côté 3, Stefan Fenz 2, Denis Hatebur 1,3, and Maritta Heisel 1 1 paluno - The Ruhr Institute for Software Technology - University
Advantages and Disadvantages of Quantitative and Qualitative Information Risk Approaches
Chinese Business Review, ISSN 1537-1506 December 2011, Vol. 10, No. 12, 1106-1110 D DAVID PUBLISHING Advantages and Disadvantages of Quantitative and Qualitative Information Risk Approaches Stroie Elena
Risk Management: Implementation principles and Inventories for Risk Management/Risk Assessment methods and tools
Risk Management: Implementation principles and Inventories for Risk Management/Risk Assessment methods and tools (Parts of this report constitute the deliverable defined in the ENISA Work Programme 2006
QUANTITATIVE MODEL FOR INFORMATION SECURITY RISK MANAGEMENT
QUANTITATIVE MODEL FOR INFORMATION SECURITY RISK MANAGEMENT Rok Bojanc ZZI d.o.o. [email protected] Abstract: The paper presents a mathematical model to improve our knowledge of information security and
Network Security: Policies and Guidelines for Effective Network Management
Network Security: Policies and Guidelines for Effective Network Management Department of Electrical and Computer Engineering, Federal University of Technology, Minna, Nigeria. [email protected], [email protected]
Key Components of a Risk-Based Security Plan
Key Components of a Risk-Based Security Plan How to Create a Plan That Works Authors: Vivek Chudgar Principal Consultant Foundstone Professional Services Jason Bevis Director Foundstone Professional Services
The Influence of Software Vulnerabilities on Business Risks 1
The Influence of Software Vulnerabilities on Business Risks 1 Four sources of risk relevant for evaluating the influence of software vulnerabilities on business risks Authors Hilbrand Kramer, MSc (Royal
ISMS Implementation Guide
atsec information security corporation 9130 Jollyville Road, Suite 260 Austin, TX 78759 Tel: 512-615-7300 Fax: 512-615-7301 www.atsec.com ISMS Implementation Guide atsec information security ISMS Implementation
The New International Standard on the Practice of Risk Management A Comparison of ISO 31000:2009 and the COSO ERM Framework
The New International Standard on the Practice of Risk Management A Comparison of ISO 31000:2009 and the COSO ERM Framework Dorothy Gjerdrum, ARM-P, Chair of the ISO 31000 US TAG and Executive Director,
Preparing for the Convergence of Risk Management & Business Continuity
Preparing for the Convergence of Risk Management & Business Continuity Disaster Recovery Journal Webinar Series September 5, 2012 2012 Strategic BCP, Inc. All rights reserved. strategicbcp.com 1 Today
CRISC Glossary. Scope Note: Risk: Can also refer to the verification of the correctness of a piece of data
CRISC Glossary Term Access control Access rights Application controls Asset Authentication The processes, rules and deployment mechanisms that control access to information systems, resources and physical
UF Risk IT Assessment Guidelines
Who Should Read This All risk assessment participants should read this document, most importantly, unit administration and IT workers. A robust risk assessment includes evaluation by all sectors of an
Security metrics to improve information security management
Security metrics to improve information security management Igli TASHI, Solange GHERNAOUTIHÉLIE HEC Business School University of Lausanne Switzerland Abstract The concept of security metrics is a very
An approach for evaluating methods for risk and vulnerability assessments
Risk, Reliability and Societal Safety Aven & Vinnem (eds) 2007 Taylor & Francis Group, London, ISBN 978-0-415-44786-7 An approach for evaluating methods for risk and vulnerability assessments E. Ford IRIS,
MEHARI 2010. Overview. April 2010. Methods working group. Please post your questions and comments on the forum: http://mehari.
MEHARI 2010 Overview April 2010 Methods working group Please post your questions and comments on the forum: http://mehari.info/ CLUB DE LA SECURITE DE L INFORMATION FRANÇAIS 30 rue Pierre Sémard, 75009
Leveraging Expertise: What Every Project Manager Really Needs to Know about Risk Management
Leveraging Expertise: What Every Project Manager Really Needs to Know about Risk Management Laszlo A. Retfalvi P.Eng. PMP PMI-RMP Principal 25 November 2014 1 Proprietary Notice This presentation contains
Information technology Security techniques Information security management systems Overview and vocabulary
INTERNATIONAL STANDARD ISO/IEC 27000 Third edition 2014-01-15 Information technology Security techniques Information security management systems Overview and vocabulary Technologies de l information Techniques
Guidance on Risk Analysis Requirements under the HIPAA Security Rule
Guidance on Risk Analysis Requirements under the HIPAA Security Rule Introduction The Office for Civil Rights (OCR) is responsible for issuing annual guidance on the provisions in the HIPAA Security Rule.
2008 by Bundesamt für Sicherheit in der Informationstechnik (BSI) Godesberger Allee 185-189, 53175 Bonn
2008 by Bundesamt für Sicherheit in der Informationstechnik (BSI) Godesberger Allee 185-189, 53175 Bonn Contents Contents 1 Introduction 1.1 Version History 1.2 Objective 1.3 Target group 1.4 Application
What is required of a compliant Risk Assessment?
What is required of a compliant Risk Assessment? ACR 2 Solutions President Jack Kolk discusses the nine elements that the Office of Civil Rights requires Covered Entities perform when conducting a HIPAA
Applying Integrated Risk Management Scenarios for Improving Enterprise Governance
Applying Integrated Risk Management Scenarios for Improving Enterprise Governance János Ivanyos Trusted Business Partners Ltd, Budapest, Hungary, [email protected] Abstract: The term of scenario is used
RiskManagement ESIEE 06/03/2012. Aloysius John March 2012
RiskManagement MOTIS ESIEE 06/03/2012 Aloysius John March 2012 Risk Management is a Introduction Process for Project manager to identify factors that may more or less affect the success or the achievement
Performing Effective Risk Assessments Dos and Don ts
Performing Effective Risk Assessments Dos and Don ts % Gary Braglia Security Specialist GreyCastle Security TCTC March 18, 2013 Introduction Who am I? Why Risk Management? Because you have to Because
Information Security Guideline for NSW Government Part 1 Information Security Risk Management
Department of Commerce Guidelines Information Security Guideline for NSW Government Part 1 Information Security Risk Management Issue No: 3.2 First Published: Sept 1997 Current Version: Jun 2003 Table
Business Continuity Policy
Business Continuity Policy St Mary Magdalene Academy V1.0 / September 2014 Document Control Document Details Document Title Document Type Business Continuity Policy Policy Version 2.0 Effective From 1st
Procuring Penetration Testing Services
Procuring Penetration Testing Services Introduction Organisations like yours have the evolving task of securing complex IT environments whilst delivering their business and brand objectives. The threat
Risk Assessment and Risk Management Methods: Information Packages for Small and Medium Sized Enterprises (SMEs)
ENISA ad hoc working group on risk assessment and risk management Risk Assessment and Risk Management Methods: Information Packages for Small and Medium Sized Enterprises (SMEs) Deliverable 2 Final version
Risk Management Frameworks
Effective Security Practices Series Driven by a wave of security legislation and regulations, many IT risk management frameworks have surfaced over the past few years. These frameworks attempt to help
Risk Management Guide for Information Technology Systems. NIST SP800-30 Overview
Risk Management Guide for Information Technology Systems NIST SP800-30 Overview 1 Risk Management Process that allows IT managers to balance operational and economic costs of protective measures and achieve
Reference source for threats, vulnerabilities, impacts and controls in IT risk assessment and risk management
ENISA ad hoc working group on risk assessment and risk management Reference source for threats, vulnerabilities, impacts and controls in IT risk assessment and risk management Deliverable 3 Version 1.0
A Risk Management Standard
A Risk Management Standard Introduction This Risk Management Standard is the result of work by a team drawn from the major risk management organisations in the UK, including the Institute of Risk management
OVERVIEW. In all, this report makes recommendations in 14 areas, such as. Page iii
The Office of the Auditor General has conducted a procedural review of the State Data Center (Data Center), a part of the Arizona Strategic Enterprise Technology (ASET) Division within the Arizona Department
Microsoft s Compliance Framework for Online Services
Microsoft s Compliance Framework for Online Services Online Services Security and Compliance Executive summary Contents Executive summary 1 The changing landscape for online services compliance 4 How Microsoft
Security Controls What Works. Southside Virginia Community College: Security Awareness
Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction
(voľný riadok písmo Arial 12) ENTERPRISE RISK MANAGEMENT AND THE INFORMATION SECURITY
Ž I L I N S K Á U N I V E R Z I T A V Ž I L I N E F A K U L T A Š P E C I Á L N E H O I N Ž I N I E R S T V A KRÍZOVÝ MANAŽMENT - 1/2012 (voľný riadok písmo Arial 12) ENTERPRISE RISK MANAGEMENT AND THE
Towards Continuous Information Security Audit
Towards Continuous Information Security Audit Dmitrijs Kozlovs, Kristine Cjaputa, Marite Kirikova Riga Technical University, Latvia {dmitrijs.kozlovs, kristine.cjaputa, marite.kirikova}@rtu.lv Abstract.
Risk Management. Upasna Saluja, PhD Candidate. Dato Dr Norbik Bashah Idris
Risk Management Upasna Saluja, PhD Candidate Dato Dr Norbik Bashah Idris 1. Abstract Information is a key asset for organizations across industries as they seek to use IT as a differentiator and key business
PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013
2013 PASTA Abstract Process for Attack S imulation & Threat Assessment Abstract VerSprite, LLC Copyright 2013 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach.
IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach. Gunnar Wahlgren 1, Stewart Kowalski 2 Stockholm University 1: ([email protected]), 2: ([email protected]) ABSTRACT
IT Governance Dr. Michael Shaw Term Project
IT Governance Dr. Michael Shaw Term Project IT Auditing Framework and Issues Dealing with Regulatory and Compliance Issues Submitted by: Gajin Tsai [email protected] May 3 rd, 2007 1 Table of Contents: Abstract...3
Information Security: Business Assurance Guidelines
Information Security: Business Assurance Guidelines The DTI drives our ambition of prosperity for all by working to create the best environment for business success in the UK. We help people and companies
Asset Management Systems Scheme (AMS Scheme)
Joint Accreditation System of Australia and New Zealand Scheme (AMS Scheme) Requirements for bodies providing audit and certification of 13 April 2015 Authority to Issue Dr James Galloway Chief Executive
Information Security Policies and Procedures Development Framework for Government Agencies. First Edition - 1432 AH
Information Security Policies and Procedures Development Framework for Government Agencies First Edition - 1432 AH 6 Contents Chapter 1 Information Security Policies and Procedures Development Framework
HIPAA Security. 6 Basics of Risk Analysis and Risk Management. Security Topics
HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical
MEHARI 2010 Information risk management method ISO/IEC 27005 compliant
MEHARI 2010 Information risk management method ISO/IEC 27005 compliant Exceeding the basic guidelines of the standard allows for a real management of risk. Février 2011 Risk Management using ISO 27005
A structured approach to Enterprise Risk Management (ERM) and the requirements of ISO 31000
A structured approach to Enterprise Risk Management (ERM) and the requirements of ISO 31000 Contents Executive summary Introduction Acknowledgements Part 1: Risk, risk management and ISO 31000 1 Nature
Underwriting put to the test: Process risks for life insurers in the context of qualitative Solvency II requirements
Underwriting put to the test: Process risks for life insurers in the context of qualitative Solvency II requirements Authors Lars Moormann Dr. Thomas Schaffrath-Chanson Contact [email protected]
STANDARD. Risk Assessment. Supply Chain Risk Management: A Compilation of Best Practices
A S I S I N T E R N A T I O N A L Supply Chain Risk Management: Risk Assessment A Compilation of Best Practices ANSI/ASIS/RIMS SCRM.1-2014 RA.1-2015 STANDARD The worldwide leader in security standards
Information Asset Profiling
Information Asset Profiling Author James F. Stevens Principal Contributors Richard A. Caralli Bradford J. Willke June 2005 Networked Systems Survivability Program Unlimited distribution subject to the
Strategic Risk Management for School Board Trustees
Strategic Management for School Board Trustees A Management Process Framework May, 2012 Table of Contents Introduction Page I. Purpose....................................... 3 II. Applicability and Scope............................
Information Security Management System (ISMS) Overview. Arhnel Klyde S. Terroza
Information Security Management System (ISMS) Overview Arhnel Klyde S. Terroza May 12, 2015 1 Arhnel Klyde S. Terroza CPA, CISA, CISM, CRISC, ISO 27001 Provisional Auditor Internal Auditor at Clarien Bank
Information Management Advice 35: Implementing Information Security Part 1: A Step by Step Approach to your Agency Project
Information Management Advice 35: Implementing Information Security Part 1: A Step by Step Approach to your Agency Project Introduction This Advice provides an overview of the steps agencies need to take
IA Metrics Why And How To Measure Goodness Of Information Assurance
IA Metrics Why And How To Measure Goodness Of Information Assurance Nadya I. Bartol PSM Users Group Conference July 2005 Agenda! IA Metrics Overview! ISO/IEC 21827 (SSE-CMM) Overview! Applying IA metrics
Cyber Security - What Would a Breach Really Mean for your Business?
Cyber Security - What Would a Breach Really Mean for your Business? August 2014 v1.0 As the internet has become increasingly important across every aspect of business, the risks posed by breaches to cyber
Information Security Managing The Risk
Information Technology Capability Maturity Model Information Security Managing The Risk Introduction Information Security continues to be business critical and is increasingly complex to manage for the
CHECKLIST ISO/IEC 17021:2011 Conformity Assessment Requirements for Bodies Providing Audit and Certification of Management Systems
Date(s) of Evaluation: CHECKLIST ISO/IEC 17021:2011 Conformity Assessment Requirements for Bodies Providing Audit and Certification of Management Systems Assessor(s) & Observer(s): Organization: Area/Field
Domain 5 Information Security Governance and Risk Management
Domain 5 Information Security Governance and Risk Management Security Frameworks CobiT (Control Objectives for Information and related Technology), developed by Information Systems Audit and Control Association
Information Security Management System for Microsoft s Cloud Infrastructure
Information Security Management System for Microsoft s Cloud Infrastructure Online Services Security and Compliance Executive summary Contents Executive summary 1 Information Security Management System
NIST National Institute of Standards and Technology
NIST National Institute of Standards and Technology Lets look at SP800-30 Risk Management Guide for Information Technology Systems (September 2012) What follows are the NIST SP800-30 slides, which are
National Infrastructure Protection Center
National Infrastructure Protection Center Risk Management: An Essential Guide to Protecting Critical Assets November 2002 Summary As organizations increase security measures and attempt to identify vulnerabilities
Risk Management Framework
Risk Management Framework Christopher J. Alberts Audrey J. Dorofee August 2010 TECHNICAL REPORT CMU/SEI-2010-TR-017 ESC-TR-2010-017 Acquisition Support Program Unlimited distribution subject to the copyright.
Guide for the Role and Responsibilities of an Information Security Officer Within State Government
Guide for the Role and Responsibilities of an Information Security Officer Within State Government Table of Contents Introduction 3 The ISO in State Government 4 Successful ISOs Necessary Skills and Abilities
Practical Overview on responsibilities of Data Protection Officers. Security measures
Practical Overview on responsibilities of Data Protection Officers Security measures Manuel Villaseca Spanish Data Protection Agency [email protected] Security measures Agenda: The rol of DPO on security measures
ASSESSMENT OF THE IT GOVERNANCE PERCEPTION WITHIN THE ROMANIAN BUSINESS ENVIRONMENT
Accounting and Management Information Systems Vol. 11, No. 1, pp. 44 55, 2012 ASSESSMENT OF THE IT GOVERNANCE PERCEPTION WITHIN THE ROMANIAN BUSINESS ENVIRONMENT Pavel NĂSTASE 1 and Simona Felicia UNCHIAŞU
SECURITY RISK MANAGEMENT
SECURITY RISK MANAGEMENT ISACA Atlanta Chapter, Geek Week August 20, 2013 Scott Ritchie, Manager, HA&W Information Assurance Services Scott Ritchie CISSP, CISA, PCI QSA, ISO 27001 Auditor Manager, HA&W
POL ENTERPRISE RISK MANAGEMENT SC51. Executive Services Department BUSINESS UNIT: Executive Support Services SERVICE UNIT:
POL ENTERPRISE RISK MANAGEMENT SC51 POLICY CODE: SC51 DIRECTORATE: Executive Services Department BUSINESS UNIT: Executive Support Services SERVICE UNIT: Executive Support Services RESPONSIBLE OFFICER:
Moving from ISO/IEC 27001:2005 to ISO/IEC 27001:2013
Transition guide Moving from ISO/IEC 27001:2005 to ISO/IEC 27001:2013 The new international standard for information security management systems ISO/IEC 27001 - Information Security Management - Transition
Information Security Governance:
Information Security Governance: Designing and Implementing Security Effectively 2 nd Athens International Forum on Security 15 16 Jan 2009 Anestis Demopoulos, CISA, CISSP, CIA President of ISACA Athens
Guidelines 1 on Information Technology Security
Guidelines 1 on Information Technology Security Introduction The State Bank of Pakistan recognizes that financial industry is built around the sanctity of the financial transactions. Owing to the critical
Ensuring Cloud Security Using Cloud Control Matrix
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 9 (2013), pp. 933-938 International Research Publications House http://www. irphouse.com /ijict.htm Ensuring
Security Control Standard
Security Standard The security and risk management baseline for the lottery sector worldwide Updated by the WLA Security and Risk Management Committee V1.0, November 2006 The WLA Security Standard is the
ISSN: 2321-7782 (Online) Volume 3, Issue 4, April 2015 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 3, Issue 4, April 2015 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
ISO27001 Controls and Objectives
Introduction This reference document for the University of Birmingham lists the control objectives, specific controls and background information, as given in Annex A to ISO/IEC 27001:2005. As such, the
UF IT Risk Assessment Standard
UF IT Risk Assessment Standard Authority This standard was enacted by the UF Senior Vice President for Administration and the UF Interim Chief Information Officer on July 10, 2008 [7]. It was approved
ISO 27001 Controls and Objectives
ISO 27001 s and Objectives A.5 Security policy A.5.1 Information security policy Objective: To provide management direction and support for information security in accordance with business requirements
AN OVERVIEW OF INFORMATION SECURITY STANDARDS
AN OVERVIEW OF INFORMATION SECURITY STANDARDS February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced
Risk Management Framework for IT-Centric Micro and Small Companies
Risk Management Framework for IT-Centric Micro and Small Companies Jasmina Trajkovski 1, Ljupcho Antovski 2 1 Trajkovski & Partners Management Consulting Sveti Kliment Ohridski 24/2/1, 1000 Skopje, Macedonia
GAO. Standards for Internal Control in the Federal Government. Internal Control. United States General Accounting Office.
GAO United States General Accounting Office Internal Control November 1999 Standards for Internal Control in the Federal Government GAO/AIMD-00-21.3.1 Foreword Federal policymakers and program managers
APPLICATION THREAT MODELING
APPLICATION THREAT MODELING APPENDIX PROCESS FOR ATTACK SIMULATION AND THREAT ANALYSIS Marco M. Morana WILEY Copyrighted material Not for distribution 1 2 Contents Appendix process for attack simulation
Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015
Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015 OIG-16-A-03 November 12, 2015 All publicly available OIG reports (including
White Paper An Enterprise Security Program and Architecture to Support Business Drivers
White Paper An Enterprise Security Program and Architecture to Support Business Drivers seccuris.com (866) 644-8442 Contents Introduction... 3 Information Assurance... 4 Sherwood Applied Business Security
Quality Risk Management
PS/INF 1/2010 * * Quality Risk Management Quality Risk Management Implementation of ICH Q9 in the pharmaceutical field an example of methodology from PIC/S Document > Authors: L. Viornery (AFSSAPS) Ph.
Risk Management Policy and Framework
Risk Management Policy and Framework December 2014 phone 1300 360 605 08 89589500 email [email protected] location 1Bagot Street Alice Springs NT 0870 post PO Box 2257 Alice Springs NT 0871
IT audit updates. Current hot topics and key considerations. IT risk assessment leading practices
IT audit updates Current hot topics and key considerations Contents IT risk assessment leading practices IT risks to consider in your audit plan IT SOX considerations and risks COSO 2013 and IT considerations
case study Core Security Technologies Summary Introductory Overview ORGANIZATION: PROJECT NAME:
The Computerworld Honors Program Summary developed the first comprehensive penetration testing product for accurately identifying and exploiting specific network vulnerabilities. Until recently, organizations
Tom Walsh, CISSP Tom Walsh Consulting, LLC Overland Park, KS. Session Objectives. Introduction Tom Walsh
Effectively Completing and Documenting a Risk Analysis Tom Walsh, CISSP Tom Walsh Consulting, LLC Overland Park, KS Session Objectives Identify the difference between risk analysis and risk assessment
ENTERPRISE RISK MANAGEMENT FOR BANKS
ENTERPRISE RISK MANAGEMENT FOR BANKS Seshagiri Rao Vaidyula, Senior Manager, Governance, Risk and Compliance Jayaprakash Kavala, Consultant, Banking and Financial Services 1 www.wipro.com/industryresearch
Measurement Information Model
mcgarry02.qxd 9/7/01 1:27 PM Page 13 2 Information Model This chapter describes one of the fundamental measurement concepts of Practical Software, the Information Model. The Information Model provides
An Effective Approach to Transition from Risk Assessment to Enterprise Risk Management
Bridgework: An Effective Approach to Transition from Risk Assessment to Enterprise Risk Management @Copyright Cura Software. All rights reserved. No part of this document may be transmitted or copied without
