95 research outputs found

    Current established risk assessment methodologies and tools

    Get PDF
    The technology behind information systems evolves at an exponential rate, while at the same time becoming more and more ubiquitous. This brings with it an implicit rise in the average complexity of systems as well as the number of external interactions. In order to allow a proper assessment of the security of such (sub)systems, a whole arsenal of methodologies, methods and tools have been developed in recent years. However, most security auditors commonly use a very small subset of this collection, that best suits their needs. This thesis aims at uncovering the differences and limitations of the most common Risk Assessment frameworks, the conceptual models that support them, as well as the tools that implement them. This is done in order to gain a better understanding of the applicability of each method and/or tool and suggest guidelines to picking the most suitable one

    Parameterization, Analysis, and Risk Management in a Comprehensive Management System with Emphasis on Energy and Performance (ISO 50001: 2018)

    Full text link
    [EN] The future of business development relies on the effective management of risks, opportunities, and energy and water resources. Here, we evaluate the application of best practices to identify, analyze, address, monitor, and control risks and opportunities (R/O) according to ISO 31000 and 50000. Furthermore, we shed light on tools, templates, ISO guides, and international documents that contribute to classifying, identifying, formulating control, and managing R/O parameterization in a comprehensive management system model, namely CMS QHSE3+, which consists of quality (Q), health and safety (HS), environmental management (E), energy efficiency (E2), and other risk components (+) that include comprehensive biosecurity and biosafety. By focusing on the deployment of R/O-based thinking (ROBT) at strategic and operational levels, we show vulnerability reduction in CMS QHSE3+ by managing energy, efficiency, and sustainability.We express our gratitude for the support from Cajacopi Atlantico, QUARA Technology, ASTEQ Technology, Universidad Simon Bolivar, Universitat Politecnica de Valencia and to all the personnel and companies who offered us their contributions and their valuable points of view.Poveda-Orjuela, PP.; GarcΓ­a-DΓ­az, JC.; Pulido-Rojano, A.; CaΓ±Γ³n-Zabala, G. (2020). Parameterization, Analysis, and Risk Management in a Comprehensive Management System with Emphasis on Energy and Performance (ISO 50001: 2018). Energies. 13(21):1-44. https://doi.org/10.3390/en13215579S1441321SDBS Business Demography Indicatorshttps://stats.oecd.org/index.aspx?queryid=70734The World Economy on a Tightrope. OECD Economic Outlook, June 2020http://www.oecd.org/economic-outlook/Strategic Plan 2016–2020www.https://trade.ec.europa.eu/doclib/docs/2016/august/tradoc_154919.pdfSMEs, and Their Business Problems. Case Analysishttps://www.redalyc.org/pdf/206/20605209.pdfMuΓ±oz, P. (2013). The Distinctive Importance of Sustainable Entrepreneurship. Current Opinion in Creativity, Innovation and Entrepreneurship, 2(1). doi:10.11565/cuocient.v2i1.26Parrish, B. D. (2010). Sustainability-driven entrepreneurship: Principles of organization design. Journal of Business Venturing, 25(5), 510-523. doi:10.1016/j.jbusvent.2009.05.005Chaos Report 2015http://www.laboratorioti.com/2016/05/16/informe-del-caos-2015-chaos-report-2015/DirecciΓ³n de Marketing. Ciudad de MΓ©xico: Pearson and Prentice Hall, 12a EdiciΓ³nhttp://biblio.econ.uba.ar/opac-tmpl/bootstrap/tc/148262_TC.pdfPoveda-Orjuela, P. P., GarcΓ­a-DΓ­az, J. C., Pulido-Rojano, A., & CaΓ±Γ³n-Zabala, G. (2019). ISO 50001: 2018 and Its Application in a Comprehensive Management System with an Energy-Performance Focus. Energies, 12(24), 4700. doi:10.3390/en12244700Continuity Planning for Your Businesshttps://www.westpac.com.au/content/dam/public/wbc/documents/pdf/help/disaster/WBC_business_continuity_planning_covid-19_checklist.pdfCOVID-19: Five Ways to Maintain Continuity and Reshape for Resiliencehttps://www.ey.com/en_be/transactions/companies-can-reshape-results-and-plan-forcovid-19-recoveryAven, T. (2012). The risk conceptβ€”historical and recent development trends. Reliability Engineering & System Safety, 99, 33-44. doi:10.1016/j.ress.2011.11.006Oliva, F. L. (2016). A maturity model for enterprise risk management. International Journal of Production Economics, 173, 66-79. doi:10.1016/j.ijpe.2015.12.007Aven, T., & Zio, E. (2011). Some considerations on the treatment of uncertainties in risk assessment for practical decision making. Reliability Engineering & System Safety, 96(1), 64-74. doi:10.1016/j.ress.2010.06.001The ISO 27k Forumhttps://www.iso27001security.com/html/iso27000.htmlKaya, Δ°. (2017). Perspectives on Internal Control and Enterprise Risk Management. Eurasian Studies in Business and Economics, 379-389. doi:10.1007/978-3-319-67913-6_26Barafort, B., Mesquida, A.-L., & Mas, A. (2017). Integrating risk management in IT settings from ISO standards and management systems perspectives. Computer Standards & Interfaces, 54, 176-185. doi:10.1016/j.csi.2016.11.010Aven, T. (2016). Risk assessment and risk management: Review of recent advances on their foundation. European Journal of Operational Research, 253(1), 1-13. doi:10.1016/j.ejor.2015.12.023Thekdi, S., & Aven, T. (2016). An enhanced data-analytic framework for integrating risk management and performance management. Reliability Engineering & System Safety, 156, 277-287. doi:10.1016/j.ress.2016.07.010Aven, T., & Zio, E. (2013). Foundational Issues in Risk Assessment and Risk Management. Risk Analysis, 34(7), 1164-1172. doi:10.1111/risa.12132LabodovΓ‘, A. (2004). Implementing integrated management systems using a risk analysis based approach. Journal of Cleaner Production, 12(6), 571-580. doi:10.1016/j.jclepro.2003.08.008World trends and the future of Latin America; ECLAC UNIDO, 2016–Public Management Series, No 85. ISSN 1680-8827, LC/L.4246 LC/IP/L.348https://repositorio.cepal.org/bitstream/handle/11362/40788/S1600740_es.pdf?sequence=1&isAllowed=yBudhi, M. K. S., Lestari, N. P. N. E., Suasih, N. N. R., & Wijaya, P. Y. (2020). Strategies and policies for developing SMEs based on creative economy. Management Science Letters, 2301-2310. doi:10.5267/j.msl.2020.3.005Melly, D., & Hanrahan, J. (2020). Tourism biosecurity risk management and planning: an international comparative analysis and implications for Ireland. Tourism Review, 76(1), 88-102. doi:10.1108/tr-07-2019-0312Guide for Business Continuity during COVID-19http://www.andi.com.co/Uploads.pdfLa Danse, 1910. Musee de l’Hermitage, Saint-PΓ©tersbourg, Russie. ConsultΓ© le 28 Juillet 2020https://www.hermitagemuseum.org/wps/portal/hermitage/Uriarte-Romero, R., Gil-Samaniego, M., Valenzuela-Mondaca, E., & Ceballos-Corral, J. (2017). Methodology for the Successful Integration of an Energy Management System to an Operational Environmental System. Sustainability, 9(8), 1304. doi:10.3390/su9081304Cosgrove, J., Littlewood, J., & Wilgeroth, P. (2017). Development of a framework of key performance indicators to identify reductions in energy consumption in a medical devices production facility. International Journal of Ambient Energy, 39(2), 202-210. doi:10.1080/01430750.2017.1278718Wu, J., Cheng, B., Wang, M., & Chen, J. (2017). Quality-Aware Energy Optimization in Wireless Video Communication With Multipath TCP. IEEE/ACM Transactions on Networking, 25(5), 2701-2718. doi:10.1109/tnet.2017.2701153Biosecurity. Madridhttps://www.insst.es/-/bioseguridadArvanitis, S., Loukis, E., & Diamantopoulou, V. (2013). The effect of soft ICT capital on innovation performance of Greek firms. Journal of Enterprise Information Management, 26(6), 679-701. doi:10.1108/jeim-07-2013-0048ICT in small firms: Factors affecting the adoption and use of ICT in Southeast England SMEshttps://aisel.aisnet.org/ecis2008/167Legg, S. J., Olsen, K. B., Laird, I. S., & Hasle, P. (2015). Managing safety in small and medium enterprises. Safety Science, 71, 189-196. doi:10.1016/j.ssci.2014.11.007PodgΓ³rski, D. (2015). Measuring operational performance of OSH management system – A demonstration of AHP-based selection of leading key performance indicators. Safety Science, 73, 146-166. doi:10.1016/j.ssci.2014.11.018Cagno, E., Micheli, G. J. L., Masi, D., & Jacinto, C. (2013). Economic evaluation of OSH and its way to SMEs: A constructive review. Safety Science, 53, 134-152. doi:10.1016/j.ssci.2012.08.016Badri, A., Gbodossou, A., & Nadeau, S. (2012). Occupational health and safety risks: Towards the integration into project management. Safety Science, 50(2), 190-198. doi:10.1016/j.ssci.2011.08.008Carlson, R., Erixon, M., Forsberg, P., & PΓ₯lsson, A.-C. (2001). System for integrated business environmental information management. Advances in Environmental Research, 5(4), 369-375. doi:10.1016/s1093-0191(01)00088-0Florio, C., & Leoni, G. (2017). Enterprise risk management and firm performance: The Italian case. The British Accounting Review, 49(1), 56-74. doi:10.1016/j.bar.2016.08.003Aven, T., & YlΓΆnen, M. (2018). A risk interpretation of sociotechnical safety perspectives. Reliability Engineering & System Safety, 175, 13-18. doi:10.1016/j.ress.2018.03.004Skorupinska, A., & Torrent-Sellens, J. (2017). ICT, Innovation and Productivity: Evidence Based on Eastern European Manufacturing Companies. Journal of the Knowledge Economy, 8(2), 768-788. doi:10.1007/s13132-016-0441-1Benitez‐Amado, J., Llorens‐Montes, F. J., & Nieves Perez‐Arostegui, M. (2010). Information technology‐enabled intrapreneurship culture and firm performance. Industrial Management & Data Systems, 110(4), 550-566. doi:10.1108/02635571011039025GonzΓ‘lez-Posada, D. M., & Reyes-Bedoya, N. (2019). Herramientas de gestiΓ³n al alcance: caso red de hostales de la ciudad de MedellΓ­n. Revista CEA, 5(9), 113-129. doi:10.22430/24223182.1261Hernandis OrtuΓ±o, B., & Briede Westermeyer, J. C. (2009). AN EDUCATIONAL APPLICATION FOR A PRODUCT DESIGN AND ENGINEERING SYSTEMS USING INTEGRATED CONCEPTUAL MODELS. Ingeniare. Revista chilena de ingenierΓ­a, 17(3). doi:10.4067/s0718-3305200900030001

    Towards Automating the Construction & Maintenance of Attack Trees: a Feasibility Study

    Full text link
    Security risk management can be applied on well-defined or existing systems; in this case, the objective is to identify existing vulnerabilities, assess the risks and provide for the adequate countermeasures. Security risk management can also be applied very early in the system's development life-cycle, when its architecture is still poorly defined; in this case, the objective is to positively influence the design work so as to produce a secure architecture from the start. The latter work is made difficult by the uncertainties on the architecture and the multiple round-trips required to keep the risk assessment study and the system architecture aligned. This is particularly true for very large projects running over many years. This paper addresses the issues raised by those risk assessment studies performed early in the system's development life-cycle. Based on industrial experience, it asserts that attack trees can help solve the human cognitive scalability issue related to securing those large, continuously-changing system-designs. However, big attack trees are difficult to build, and even more difficult to maintain. This paper therefore proposes a systematic approach to automate the construction and maintenance of such big attack trees, based on the system's operational and logical architectures, the system's traditional risk assessment study and a security knowledge database.Comment: In Proceedings GraMSec 2014, arXiv:1404.163

    Integrisan model za upravljanje rizikom u standardizovanim menadΕΎment sistemima

    Get PDF
    Nowadays organizations seek to use various management system standards (MSSs) in order to organize their management systems and improve the performance of their operations in the right way and then provide the necessary support to manage and address the risks associated with providing these products and services to clients and other stakeholders in addition to providing confidence and security to stakeholders. In this regard, as the first step, a research study has been carried out to analyze the number of companies that have standardized management systems (SMS) obtained for the standards ISO 9001, ISO14001, ISO 50001, ISO 27001, ISO 22000, ISO 13485, ISO 22301, ISO 20000-1, ISO 28000 and ISO 39001 across the continents in 2014, as a result of the increasing growth rate in the management system standards. Later in 2019, the research was conducted to analyze the growth rate of the certificates issued for the standards in addition to five other new standards that were added to the previous ones across the same continents. Based on those longitudinal analyses, according to obtained regression models, predictions were given and standards with the strongest growth trends were identified. However, till now has not been found a framework to define a common and unified standard model for integrated management systems that can be used in all contingency factors settings. Since, as the main objective of applying the standards of management systems in the organizations is to identify the risks that affect the organization's ability to achieve its goals and desired results in addition to organizing and coordinating all operations and the optimal use of resources, the purpose of this dissertation was to develop an integrated risk management model for standardized management systems with predicted growing trends: ISO 9001:2015, ISO 14001:2015, ISO/IEC 27001:2013, ISO 45001:2018 and ISO 22000:2018 in order to enable organizations to manage their processes and associated risks in manner to decrease the number of resources employed and to enhance the organization performance. Novel risk management integrated model in standardized management systems has three levels – correspondence, coordination and integration and put in place an explicit and systematic approach to managing all risks in the organization. Forms of certain documented information also encompass proposed model. Model has been checked empirically to analyze how organizations in Serbia integrate their MSs and their audits, as well as how they feel and act on risk management issues, all together with difficulties and time needed to integrate MSs, extent of integration of MSs in organizations overall, extent of integrated MS processes, resources and goals, extent of integration of the elements of audit systems and benefits of having integrated audits in organizations together with novel risk model check. Regarding integration, results similar to previous studies have been obtained. Contextual independence of proposed model has been checked using Mann-Whitney U*test and it has been proved that model is context free and applicable to companies different in size and sector. Also, performance indicators have been analyzed and 72% of positive and only 4.5% of negative attitudes have been reached. Accordingly, posted hypothesis have been proved and novel model enables companies to reach the defined goals of the company, as it is experimentally verified.Данас ΠΎΡ€Π³Π°Π½ΠΈΠ·Π°Ρ†ΠΈΡ˜Π΅ Ρ‚Π΅ΠΆΠ΅ ΠΏΡ€ΠΈΠΌΠ΅Π½ΠΈ Ρ€Π°Π·Π»ΠΈΡ‡ΠΈΡ‚ΠΈΡ… стандарда систСма ΠΌΠ΅Π½Π°ΡŸΠΌΠ΅Π½Ρ‚Π° ΠΊΠ°ΠΊΠΎ Π±ΠΈ ΠΎΡ€Π³Π°Π½ΠΈΠ·ΠΎΠ²Π°Π»Π΅ својС систСмС ΡƒΠΏΡ€Π°Π²Ρ™Π°ΡšΠ° ΠΈ ΠΏΠΎΠ±ΠΎΡ™ΡˆΠ°Π»Π΅ пСрформансС пословања Π½Π° ΠΏΡ€Π°Π²ΠΈΠ»Π°Π½ ΠΈ ΠΆΠ΅Ρ™Π΅Π½ Π½Π°Ρ‡ΠΈΠ½, ΠΊΠ°ΠΎ ΠΈ Π΄Π° Π±ΠΈ ΠΎΠ±Π΅Π·Π±Π΅Π΄ΠΈΠ»ΠΈ ΠΏΠΎΡ‚Ρ€Π΅Π±Π½Ρƒ ΠΏΠΎΠ΄Ρ€ΡˆΠΊΡƒ Π·Π° ΡƒΠΏΡ€Π°Π²Ρ™Π°ΡšΠ΅ Ρ€ΠΈΠ·ΠΈΡ†ΠΈΠΌΠ° ΠΏΡ€ΠΈ ΠΏΡ€ΡƒΠΆΠ°ΡšΡƒ ΠΏΡ€ΠΎΠΈΠ·Π²ΠΎΠ΄Π° ΠΈ услуга ΠΊΠ»ΠΈΡ˜Π΅Π½Ρ‚ΠΈΠΌΠ° ΠΈ Π΄Ρ€ΡƒΠ³ΠΈΠΌ заинтСрСсованим странама, ΡƒΠ· ΡΡ‚ΠΈΡ†Π°ΡšΠ΅ ΠΏΠΎΠ²Π΅Ρ€Π΅ΡšΠ° ΠΊΠΎΠ΄ свих заинтСрСсованих страна. Π‘Ρ‚ΠΎΠ³Π° јС Π½Π°Ρ˜ΠΏΡ€Π΅ спровСдСнао ΠΈΡΡ‚Ρ€Π°ΠΆΠΈΠ²Π°ΡšΠ΅, која јС Π°Π½Π°Π»ΠΈΠ·ΠΈΡ€Π°Π»ΠΎ Ρ‚Ρ€Π΅Π½Π΄ΠΎΠ²Π΅ раста Π±Ρ€ΠΎΡ˜ компанија којС ΠΈΠΌΠ°Ρ˜Ρƒ стандардизованС систСмС ΡƒΠΏΡ€Π°Π²Ρ™Π°ΡšΠ° (БМБ) Π·Π° стандардС ИБО 9001, ИБО14001, ИБО 50001, ИБО 27001, ИБО 22000, ИБО 13485, ИБО 22301, ИБО 20000-1, ИБО 28000 ΠΈ ИБО 39001 ΡˆΠΈΡ€ΠΎΠΌ свСта Π½Π°Ρ˜ΠΏΡ€Π΅ Ρƒ 2014. Π³ΠΎΠ΄ΠΈΠ½ΠΈ, Π° Π·Π°Ρ‚ΠΈΠΌ ΠΈ Ρƒ 2018. Π³ΠΎΠ΄ΠΈΠ½ΠΈ. УспостављСни су Π»ΠΎΠ½Π³ΠΈΡ‚ΡƒΠ΄ΠΈΠ½Π°Π»Π½ΠΈ ΠΏΡ€Π΅Π΄ΠΈΠΊΡ‚ΠΈΠ²Π½ΠΈ рСгрСсиони ΠΌΠΎΠ΄Π΅Π»ΠΈ ΠΈ дСтСрминисани су стандарди са Π½Π°Ρ˜Π²Π΅Ρ›ΠΈΠΌ статистички Π·Π½Π°Ρ‡Π°Ρ˜Π½ΠΈΠΌ Ρ‚Ρ€Π΅Π½Π΄ΠΎΠ²ΠΈΠΌΠ° раста. Како Π΄ΠΎ данас нијС располоТив ΠΎΠΊΠ²ΠΈΡ€ који Π΄Π΅Ρ„ΠΈΠ½ΠΈΡˆΠ΅ Π·Π°Ρ˜Π΅Π΄Π½ΠΈΡ‡ΠΊΠΈ ΠΈ објСдињСни ΠΌΠΎΠ΄Π΅Π» интСгрисаних систСма ΡƒΠΏΡ€Π°Π²Ρ™Π°ΡšΠ° који сС ΠΌΠΎΠ³Ρƒ користити нСзависно ΠΎΠ΄ контСкста, Ρ†ΠΈΡ™ ΠΎΠ²Π΅ Π΄ΠΈΡΠ΅Ρ€Ρ‚Π°Ρ†ΠΈΡ˜Π΅ Π±ΠΈΠ»Π° јС ΠΈΠ·Ρ€Π°Π΄Π° интСгрисаног ΠΌΠΎΠ΄Π΅Π»Π° ΡƒΠΏΡ€Π°Π²Ρ™Π°ΡšΠ° Ρ€ΠΈΠ·ΠΈΠΊΠΎΠΌ Π·Π° стандардизованС систСмС ΡƒΠΏΡ€Π°Π²Ρ™Π°ΡšΠ° са високим Ρ‚Ρ€Π΅Π½Π΄ΠΎΠΌ раста Π±Ρ€ΠΎΡ˜Π° сСртификата: ИБО 9001: 2015, ИБО 14001: 2015, ИБО / Π˜Π•Π¦ 27001: 2013, ИБО 45001: 2018, ΠΈ ИБО 22000: 2018 ΠΊΠ°ΠΊΠΎ Π±ΠΈ ΠΎΡ€Π³Π°Π½ΠΈΠ·Π°Ρ†ΠΈΡ˜Π΅ ΠΌΠΎΠ³Π»Π΅ Π΄Π° ΡƒΠΏΡ€Π°Π²Ρ™Π°Ρ˜Ρƒ својим процСсима ΠΈ ΠΏΠΎΠ²Π΅Π·Π°Π½ΠΈΠΌ Ρ€ΠΈΠ·ΠΈΡ†ΠΈΠΌΠ° Π½Π° интСгрисан Π½Π°Ρ‡ΠΈΠ½ који ΡΠΌΠ°ΡšΡƒΡ˜Π΅ Π±Ρ€ΠΎΡ˜ Π°Π½Π³Π°ΠΆΠΎΠ²Π°Π½ΠΈΡ… рСсурса ΠΈ ΠΎΠΌΠΎΠ³ΡƒΡ›Π°Π²Π° ΠΏΠΎΠ±ΠΎΡ™ΡˆΠ°ΡšΠ΅ пСрформанси ΠΎΡ€Π³Π°Π½ΠΈΠ·Π°Ρ†ΠΈΡ˜Π΅. НовопрСдлоТСни ΠΌΠΎΠ΄Π΅Π» ΠΌΠ΅Π½Π°ΡŸΠΌΠ΅Π½Ρ‚Π° Ρ€ΠΈΠ·ΠΈΠΊΠΎΠΌ Ρƒ интСгрисаним ΠΌΠ΅Π½Π°ΡŸΠΌΠ΅Π½Ρ‚ систСмима ΠΈΠΌΠ° Ρ‚Ρ€ΠΈ Π½ΠΈΠ²ΠΎΠ° – адСкватност, ΠΊΠΎΠΎΡ€Π΄ΠΈΠ½Π°Ρ†ΠΈΡ˜Ρƒ ΠΈ ΠΈΠ½Ρ‚Π΅Π³Ρ€Π°Ρ†ΠΈΡ˜Ρƒ ΠΈ ΠΏΡ€ΡƒΠΆΠ° Сксплицитан, систСматичан приступ ΡƒΠΏΡ€Π°Π²Ρ™Π°ΡšΡƒ Ρ€ΠΈΠ·ΠΈΡ†ΠΈΠΌΠ° Ρƒ ΠΎΡ€Π³Π°Π½ΠΈΠ·Π°Ρ†ΠΈΡ˜Π°ΠΌΠ°. МодСл јС ΡƒΠΏΠΎΡ‚ΠΏΡƒΡšΠ΅Π½ ΠΈ Π΄ΠΎΠΊΡƒΠΌΠ΅Π½Ρ‚ΠΎΠ²Π°Π½ΠΈΠΌ ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΡ˜Π°ΠΌΠ° ΠΎΠ΄ Π·Π½Π°Ρ‡Π°Ρ˜Π° Π·Π° ΠΏΡ€ΠΈΠΌΠ΅Π½Ρƒ. Π’Π°ΠΊΠΎΡ’Π΅, ΠΌΠΎΠ΄Π΅Π» јС ΠΏΡ€ΠΎΠ²Π΅Ρ€Π΅Π½ Ρƒ пракси ΠΌΠ΅Ρ‚ΠΎΠ΄Π°ΠΌΠ° Π°Π½ΠΊΠ΅Ρ‚ΠΈΡ€Π°ΡšΠ° ΠΈ ΠΈΠ½Ρ‚Π΅Ρ€Π²ΡƒΡ˜Π°, са Ρ†ΠΈΡ™Π΅ΠΌ Π΄Π° сС истраТи Π½Π°Ρ‡ΠΈΠ½ ΠΈ ΠΎΠ±ΠΈΠΌ ΠΈΠ½Ρ‚Π΅Π³Ρ€Π°Ρ†ΠΈΡ˜Π΅, спровСдСни Π°ΡƒΠ΄ΠΈΡ‚ΠΈ, Ρ‚Π΅ΡˆΠΊΠΎΡ›Π΅, користи ΠΈ врСмСнски ΠΎΠΊΠ²ΠΈΡ€ΠΈ ΠΈΠ½Ρ‚Π΅Π³Ρ€Π°Ρ†ΠΈΡ˜Π΅, ΠΈ ΠΏΡ€ΠΈΠΌΠ΅Π½ΠΎΠΌ факторскС, рСгрСсионС Π°Π½Π°Π»ΠΈΠ·Π΅ ΠΈ Π°Π½Π°Π»ΠΈΠ·Π΅ поузданости ΠΈΠ·Π²Ρ€ΡˆΠ΅Π½Π° јС ΠΏΡ€ΠΎΠ²Π΅Ρ€Π° Π½ΠΎΠ²ΠΎΠΏΡ€Π΅Π΄Π»ΠΎΠΆΠ΅Π½ΠΎΠ³ ΠΌΠΎΠ΄Π΅Π»Π° ΠΈ ΡƒΡ‚ΠΈΡ†Π°Ρ˜ΠΈ Π½Π° пословнС пСрформансС. По ΠΏΠΈΡ‚Π°ΡšΡƒ ΠΈΠ½Ρ‚Π΅Π³Ρ€Π°Ρ†ΠΈΡ˜Π°, добијСни су Ρ€Π΅Π·ΡƒΠ»Ρ‚Π°Ρ‚ΠΈ ΠΏΠΎΠ΄ΡƒΠ΄Π°Ρ€Π½ΠΈ Ρ€Π΅Ρ‚ΠΊΠΈΠΌ ΠΏΡ€Π΅Ρ‚Ρ…ΠΎΠ΄Π½ΠΈΠΌ ΠΈΡΡ‚Ρ€Π°ΠΆΠΈΠ²Π°ΡšΠΈΠΌΠ°. ΠšΠΎΠ½Ρ‚Π΅ΠΊΡΡ‚ΡƒΠ°Π»Π½Π° нСзависност Π½ΠΎΠ²ΠΎΠΏΡ€Π΅Π΄Π»ΠΎΠΆΠ΅Π½ΠΎΠ³ ΠΌΠΎΠ΄Π΅Π»Π° ΠΏΠΎΡ‚Π²Ρ€Ρ’Π΅Π½Π° јС ΠΏΡ€ΠΈΠΌΠ΅Π½ΠΎΠΌ Mann-Whitney U* тСста. МодСл јС ΠΏΡ€ΠΈΠΌΠ΅ΡšΠΈΠ² Ρƒ ΠΎΡ€Π³Π°Π½ΠΈΠ·Π°Ρ†ΠΈΡ˜Π°ΠΌΠ° назависно ΠΎΠ΄ Π²Π΅Π»ΠΈΡ‡ΠΈΠ½Π΅ ΠΈ припадности ΠΎΠ΄Ρ€Π΅Ρ’Π΅Π½ΠΎΠΌ ΠΈΠ½Π΄ΡƒΡΡ‚Ρ€ΠΈΡ˜ΡΠΊΠΎΠΌ сСктору. Π’Π°ΠΊΠΎΡ’Π΅, Π°Π½Π°Π»ΠΈΠ·ΠΈΡ€Π°Π½ΠΈ су ΠΈΠ½Π΄ΠΈΠΊΠ°Ρ‚ΠΎΡ€ΠΈ пословних пСрформанси ΠΈ Ρ€Π΅Π·ΡƒΠ»Ρ‚Π°Ρ‚ΠΈ ΠΏΠΎΠΊΠ°Π·ΡƒΡ˜Ρƒ 72% ΠΏΠΎΠ·ΠΈΡ‚ΠΈΠ²Π½ΠΈΡ… ΠΈ свСга 4,5% Π½Π΅Π³Π°Ρ‚ΠΈΠ²Π½ΠΈΡ… ставова. ΠšΠΎΠ½Π°Ρ‡Π½ΠΎ, постављСнС Ρ…ΠΈΠΏΠΎΡ‚Π΅Π·Π΅ су ΠΏΠΎΡ‚Π²Ρ€Ρ’Π΅Π½Π΅ ΠΈ ΠΌΠΎΠ΄Π΅Π» ΠΎΠΌΠΎΠ³ΡƒΡ›Π°Π²Π° ΠΏΡ€Π΅Π΄ΡƒΠ·Π΅Ρ›ΠΈΠΌΠ° ΠΎΡΡ‚Π²Π°Ρ€Π΅ΡšΠ΅ постављСних Ρ†ΠΈΡ™Π΅Π²Π°, сходно Π΅ΠΊΡΠΏΠ΅Ρ€ΠΈΠΌΠ΅Π½Ρ‚Π°Π»Π½ΠΎΡ˜ Π²Π΅Ρ€ΠΈΡ„ΠΈΠΊΠ°Ρ†ΠΈΡ˜ΠΈ

    A Systems Approach to Information Security for the Twenty-First Century Organization

    Get PDF
    A crisis resulting from disruptive events that threaten to harm the organization or its stakeholders can originate from a plethora of sources. Data breaches, unauthorized disclosures of confidential information, and data leaks, are on the news almost daily. Most guidelines and standards published by prominent International Standards Organizations hold that risk-based thinking supports public, private, and community enterprises (referred for convenience in this work by the generic term β€œorganization”) in determining the forces that could cause their key and enabling processes to deviate from planned arrangements, to apply preventive measures to modify risk, and to take advantage of opportunities as they arise. A well-structured Information Security Management System that is developed, implemented, and maintained through sound risk-based thinking, enables the organization to take appropriate actions to address the risks and opportunities associated with its information resources, in a manner that is commensurate to the complexity of its socio-technical infrastructure and the external environmentassociated with its activities. In this work we explore the Risk Management Process that is outlined in the ISO 31000 international standard, through the requirements/guidelines defined in the ISO/IEC 27000-series of international standards. The knowledge gained is applied to develop a systems driven conceptual structure thatcan be employed by any organization operating on the complexities of an interconnected environment, for the purpose of designing, implementing, monitoring, reviewing and continually improving a structured Information Security Management System

    A national cybersecurity management framework for developing countries

    Get PDF
    Abstract : Please refer to full text to view abstract.D.Phil. (Computer Science

    Readiness of local authorities in implementing information security management system (ISMS)

    Get PDF
    Information Security Management System (ISMS) is an ICT Compliance Standards to provide specifications and controls for protecting information security assets and to increase the integrity and confidence of clients against the agencies, especially those involving the government delivery service. This certification is certified by a certification body of the Standards Industrial Research Institute of Malaysia (SIRIM) and a survey covering the problems faced by Local Authorities in ensuring the confidentiality, integrity and availability of information from any threat and risks that can cripple the agency services. The research process include factors such as threats and vulnerabilities, particularly in security management practices of the agency, which can cause loss of agencies' information and negative impact on the services provided by the Local Authority. Then with studying these factors it can measure the readiness of local authorities in implementing Information Security Management System (ISMS). The process of research studies using quantitative methods in gathering information to analyze the problems faced by the agency to ensure information security is protected such as assessment taxes is the largest contributor earning council. The final result of this research concluded that local authorities are still not ready in implementing Information Security Management System (ISMS)
    • …
    corecore