A Cloud Security Risk-Management Strategy

2014 ◽  
Vol 1 (2) ◽  
pp. 52-56 ◽  
Author(s):  
Kim-Kwang Raymond Choo
Author(s):  
Guoling Lao ◽  
Liping Wang

This chapter is about a new security risk management strategy for financial services institutions. The proper strategy presented here takes the systematic and cybernetics theory as the instruction, regards the risk analysis process, the management strategy implementation, and the monitor and audit as an organic security management system. Thus the strategy is an auto adapted open system to defeat various safety threats dynamically. By comparing management of electronic commerce (e-commerce) security risks with that of traditional financial risks, this chapter suggests accurate security risk measurement using quantitative analysis and further integration of the e-commerce security risk with traditional financial risks.


2021 ◽  
Vol 13 (6) ◽  
pp. 148
Author(s):  
Traian Mihai Popescu ◽  
Alina Madalina Popescu ◽  
Gabriela Prostean

Nowadays, Internet of Things (IoT) adoptions are burgeoning and deemed the lynchpin towards achieving ubiquitous connectivity. In this context, defining and leveraging robust IoT security risk management strategies are paramount for secure IoT adoptions. Thus, this study aims to support IoT adopters from any sector to formulate or reframe their IoT security risk management strategies to achieve robust strategies that effectively address IoT security issues. In a nutshell, this article relies on a mixed methods research methodology and proposes a reference model for IoT security risk management strategy. The proposed IoT security risk management strategy reference model (IoTSRM2) relies on the 25 selected IoT security best practices which are outlined using a proposed taxonomic hierarchy, and on the proposed three-phased methodology that consists of nine steps and outputs. The main contribution of this work is the proposed IoTSRM2 which consists of six domains, 16 objectives, and 30 prioritized controls. Furthermore, prior to providing the related work, this article provides a critical evaluation of selected informative references of IoTSRM2 based on their percentage-wise linkage to the IoTSRM2 domains and to the entire IoTSRM2. The findings of the critical evaluation illustrate, inter alia, the selected informative references that are the top three most and least linked to the entire IoTSRM2.


Sign in / Sign up

Export Citation Format

Share Document