5 research outputs found

    Modelling semantics of security risk assessment for bring your own device using metamodelling technique

    Get PDF
    Rapid changes in mobile computing devices or modern devices such as smartphones, tablets and iPads have encouraged employees to use their personal devices at workplace. Bring Your Own Devices (BYOD) phenomenon in an enterprise has become pervasive in demand for business purposes. Most organizations practice BYOD as it offers a wide variety of advantages such as increasing work productivity, reducing cost and giving employeeā€™s satisfaction. Despite that, BYOD practices trigger opportunities and challenges for the enterprise if there have no security policies, regulations and management on personal devices. Common BYOD security threats includes data leakage, exposure to malicious malware and sensitive corporates information. In this study, the Security-based BYOD Risk Assessment Metamodel (Security-based BYODRAM), a high-level knowledge structure was proposed for describing Security-based BYOD Risk Assessment domain. Review on thirty-five existing models which comprises of Risk Assessment and BYOD security models was done to identify the important concepts and semantic. Meta Object Facility (MOF) was the metamodeling language used in developing the metamodel. This study contributes a platform of incorporating and sharing of the Security-based BYOD Risk Assessment knowledge and giving solutions in managing BYOD security breaches. Real BYOD scenarios such as the Ottawa Hospital, privacy risks in enterprise and independent schools in Western Australian were used in demonstrating the semantics of proposed metamodel

    Informacijos saugos valdymo karkasas smulkiam ir vidutiniam verslui

    Get PDF
    Information security is one of the concerns any organization or person faces. The list of new threats appears, and information security management mechanisms have to be established and continuously updated to be able to fight against possible security issues. To be up to date with existing information technology threats and prevention, protection, maintenance possibilities, more significant organizations establish positions or even departments, to be responsible for the information security management. However, small and medium enterprise (SME) does not have enough capacities. Therefore, the information security management situation in SMEs is fragmented and needs improvement. In this thesis, the problem of information security management in the small and medium enterprise is analyzed. It aims to simplify the information security management process in the small and medium enterprise by proposing concentrated information and tools in information security management framework. Existence of an information security framework could motivate SME to use it in practice and lead to an increase of SME security level. The dissertation consists of an introduction, four main chapters and general conclusions. The first chapter introduces the problem of information security management and itsā€™ automation. Moreover, state-of-the-art frameworks for information security management in SME are analyzed and compared. The second chapter proposes a novel information security management framework and guidelines on its adoption. The framework is designed based on existing methodologies and frameworks. A need for a model for security evaluation based on the organizationā€™s management structure noticed in chapter two; therefore, new probability theory-based model for organizations information flow security level estimation presented in chapter three. The fourth chapter presents the validation of proposed security evaluation models by showing results of a case study and experts ranking of the same situations. The multi-criteria analysis was executed to evaluate the ISMF suitability to be applied in a small and medium enterprise. In this chapter, we also analyze the opinion of information technology employees in an SME on newly proposed information security management framework as well as a new model for information security level estimation. The thesis is summarized by the general conclusions which confirm the need of newly proposed framework and associated tools as well as its suitability to be used in SME to increase the understanding of current information security threat situation.Dissertatio

    Multikonferenz Wirtschaftsinformatik (MKWI) 2016: Technische UniversitƤt Ilmenau, 09. - 11. MƤrz 2016; Band II

    Get PDF
    Ɯbersicht der Teilkonferenzen Band II ā€¢ eHealth as a Service ā€“ Innovationen fĆ¼r PrƤvention, Versorgung und Forschung ā€¢ Einsatz von Unternehmenssoftware in der Lehre ā€¢ Energieinformatik, Erneuerbare Energien und Neue MobilitƤt ā€¢ Hedonische Informationssysteme ā€¢ IKT-gestĆ¼tztes betriebliches Umwelt- und Nachhaltigkeitsmanagement ā€¢ Informationssysteme in der Finanzwirtschaft ā€¢ IT- und Software-Produktmanagement in Internet-of-Things-basierten Infrastrukturen ā€¢ IT-Beratung im Kontext digitaler Transformation ā€¢ IT-Sicherheit fĆ¼r Kritische Infrastrukturen ā€¢ Modellierung betrieblicher Informationssysteme ā€“ Konzeptuelle Modelle im Zeitalter der digitalisierten Wirtschaft (d!conomy) ā€¢ Prescriptive Analytics in I
    corecore