首页> 外文期刊>ACM Computing Surveys >Exiting the Risk Assessment Maze: A Meta-Survey
【24h】

Exiting the Risk Assessment Maze: A Meta-Survey

机译:退出风险评估迷宫:一项元调查

获取原文
获取原文并翻译 | 示例
       

摘要

Organizations are exposed to threats that increase the risk factor of their ICT systems. The assurance of their protection is crucial, as their reliance on information technology is a continuing challenge for both security experts and chief executives. As risk assessment could be a necessary process in an organization, one of its deliverables could be utilized in addressing threats and thus facilitate the development of a security strategy. Given the large number of heterogeneous methods and risk assessment tools that exist, comparison criteria can provide better understanding of their options and characteristics and facilitate the selection of a method that best fits an organization's needs. This article aims to address the problem of selecting an appropriate risk assessment method to assess and manage information security risks, by proposing a set of comparison criteria, grouped into four categories. Based upon them, it provides a comparison of the 10 popular risk assessment methods that could be utilized by organizations to determine the method that is more suitable for their needs. Finally, a case study is presented to demonstrate the selection of a method based on the proposed criteria.
机译:组织面临着增加其ICT系统风险因素的威胁。确保对他们的保护至关重要,因为他们对信息技术的依赖对安全专家和首席执行官都是持续的挑战。由于风险评估可能是组织中的必要过程,因此可以将其可交付成果之一用于应对威胁,从而促进安全策略的制定。鉴于存在大量的异构方法和风险评估工具,比较标准可以更好地理解其选择和特征,并有助于选择最适合组织需求的方法。本文旨在通过提出一套分为四个类别的比较标准,解决选择适当的风险评估方法来评估和管理信息安全风险的问题。基于它们,它提供了组织可以用来确定更适合其需求的10种流行风险评估方法的比较。最后,提出了一个案例研究,以证明根据建议的标准选择方法。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号