4.5 Article

Taxonomy of information security risk assessment (ISRA)

期刊

COMPUTERS & SECURITY
卷 57, 期 -, 页码 14-30

出版社

ELSEVIER ADVANCED TECHNOLOGY
DOI: 10.1016/j.cose.2015.11.001

关键词

Information security; Risk assessment; Risk management; Risk analysis; Threat; Vulnerability

资金

  1. Natural Sciences and Engineering Research Council of Canada Research Chair on Sustainable Smart Eco-Cloud [NSERC-950-229052]
  2. NSERC [CRDPJ 424371-11]

向作者/读者索取更多资源

Information is a perennially significant business asset in all organizations. Therefore, it must be protected as any other valuable asset. This is the objective of information security, and an information security program provides this kind of protection for a company's information assets and for the company as a whole. One of the best ways to address information security problems in the corporate world is through a risk-based approach. In this paper, we present a taxonomy of security risk assessment drawn from 125 papers published from 1995 to May 2014. Organizations with different size may face problems in selecting suitable risk assessment methods that satisfy their needs. Although many risk-based approaches have been proposed, most of them are based on the old taxonomy, avoiding the need for considering and applying the important criteria in assessing risk raised by rapidly changing technologies and the attackers knowledge level. In this paper, we discuss the key features of risk assessment that should be included in an information security management system. We believe that our new risk assessment taxonomy helps organizations to not only understand the risk assessment better by comparing different new concepts but also select a suitable way to conduct the risk assessment properly. Moreover, this taxonomy will open up interesting avenues for future research in the growing field of security risk assessment. (C) 2015 Elsevier Ltd. All rights reserved.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.5
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据