Computer Security Risk Analysis and Management

1989 ◽  
pp. 81-117
Author(s):  
M. Shain ◽  
A. Anderson
Author(s):  
M. J. Warren

Understanding and managing information infrastructure (II) security risks is a priority to most organizations dealing with information technology and information warfare (IW) scenarios today (Libicki, 2000). Traditional security risk analysis (SRA) was well suited to these tasks within the paradigm of computer security, where the focus was on securing tangible items such as computing and communications equipment (NCS,1996; Cramer, 1998). With the growth of information interchange and reliance on information infrastructure, the ability to understand where vulnerabilities lie within an organization, regardless of size, has become extremely difficult (NIPC, 1996). To place a value on the information that is owned and used by an organization is virtually an impossible task. The suitability of risk analysis to assist in managing IW and information infrastructure-related security risks is unqualified, however studies have been undertaken to build frameworks and methodologies for modeling information warfare attacks (Molander, Riddile, & Wilson, 1996; Johnson, 1997; Hutchinson & Warren, 2001) which will assist greatly in applying risk analysis concepts and methodologies to the burgeoning information technology security paradigm, information warfare.


Author(s):  
Musbau D. Abdulrahaman ◽  
◽  
John K. Alhassan ◽  
Joseph A. Ojeniyi ◽  
Shafii M. Abdulhamid

UDA AKADEM ◽  
2018 ◽  
pp. 38-47
Author(s):  
Esteban Crespo-Martínez ◽  
Geovanna Cordero-Torres

Lograr el objetivo de proponer una metodología de seguridad de la información para la gestión del riesgoinformático, aplicable al entorno empresarial y organizacional, del sector MPYME ecuatoriano, requiere del análisis de las metodologías Magerit y CRAMM (CCTA Risk Analysis and Management Method), las mismas que son internacionalmente utilizadas en la gestión del riesgo de información; contemplando los marcos de referencia que contienen las mejores prácticas de la industria: ISO 27001, 27002, 27005 y 31000.Palabras clave: riesgos, gestión, Magerit, CRAMM, tecnologías de información, TI, seguridad, información, SGSI.AbstractThis paper aims to study the CRAMM (CCTA Risk Analysis and Manage ment Method) and Magerit methodologies used in information risk management. It contemplates international reference frames that contain the best practices in the industry: ISO 27001, 27002, 27005 and 31000.This research is part of a project proposal of “Methodology for information security risk management, applicable to MSMEs” applicable to the Ecuadorian environment. Keywords: Risk, Management, Magerit, CRAMM, Information Technology, IT, Information Security, ISMS.  


2000 ◽  
Vol 32 (11) ◽  
pp. 58-64
Author(s):  
Mikhail Z. Zgurowsky ◽  
Igor I. Kovalenko ◽  
Kuteiba Kondrak ◽  
Elias Kondrak

2021 ◽  
Vol 1077 (1) ◽  
pp. 012002
Author(s):  
Edri Yunizal ◽  
Judhi Santoso ◽  
Kridanto Surendro
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document