scholarly journals Cyber Security Risk Management Strategy for VG Trading Company

Author(s):  
Chaewon ◽  
Jiyoung
Author(s):  
Guoling Lao ◽  
Liping Wang

This chapter is about a new security risk management strategy for financial services institutions. The proper strategy presented here takes the systematic and cybernetics theory as the instruction, regards the risk analysis process, the management strategy implementation, and the monitor and audit as an organic security management system. Thus the strategy is an auto adapted open system to defeat various safety threats dynamically. By comparing management of electronic commerce (e-commerce) security risks with that of traditional financial risks, this chapter suggests accurate security risk measurement using quantitative analysis and further integration of the e-commerce security risk with traditional financial risks.


2021 ◽  
Vol 13 (6) ◽  
pp. 148
Author(s):  
Traian Mihai Popescu ◽  
Alina Madalina Popescu ◽  
Gabriela Prostean

Nowadays, Internet of Things (IoT) adoptions are burgeoning and deemed the lynchpin towards achieving ubiquitous connectivity. In this context, defining and leveraging robust IoT security risk management strategies are paramount for secure IoT adoptions. Thus, this study aims to support IoT adopters from any sector to formulate or reframe their IoT security risk management strategies to achieve robust strategies that effectively address IoT security issues. In a nutshell, this article relies on a mixed methods research methodology and proposes a reference model for IoT security risk management strategy. The proposed IoT security risk management strategy reference model (IoTSRM2) relies on the 25 selected IoT security best practices which are outlined using a proposed taxonomic hierarchy, and on the proposed three-phased methodology that consists of nine steps and outputs. The main contribution of this work is the proposed IoTSRM2 which consists of six domains, 16 objectives, and 30 prioritized controls. Furthermore, prior to providing the related work, this article provides a critical evaluation of selected informative references of IoTSRM2 based on their percentage-wise linkage to the IoTSRM2 domains and to the entire IoTSRM2. The findings of the critical evaluation illustrate, inter alia, the selected informative references that are the top three most and least linked to the entire IoTSRM2.


2018 ◽  
pp. 1299-1317
Author(s):  
Neila Rjaibi ◽  
Latifa Ben Arfa Rabai

This chapter presents the security concepts terminologies (threat, risk, security risk management, security risk management process, security threat model) and present the state of the art of security risk management models, compare and discuss strengths and weaknesses of such models. Then it presents the Mean Failure Cost (MFC) model for quantifying security threats as a rigorous measure of cyber security, and as a cascade of linear models in order to estimate the system security using the loss of a given stakeholders as a result of security breakdown. Finally it presents an overview of the applicability of the MFC measure to e-systems. In the conclusion, the chapter criticizes the MFC Cyber Security Measure and presents an overview of different perspectives.


ITNOW ◽  
2015 ◽  
Vol 57 (4) ◽  
pp. 26-27 ◽  
Author(s):  
S. Marvell

2018 ◽  
pp. 452-470
Author(s):  
Neila Rjaibi ◽  
Latifa Ben Arfa Rabai

This chapter presents the security concepts terminologies (threat, risk, security risk management, security risk management process, security threat model) and present the state of the art of security risk management models, compare and discuss strengths and weaknesses of such models. Then it presents the Mean Failure Cost (MFC) model for quantifying security threats as a rigorous measure of cyber security, and as a cascade of linear models in order to estimate the system security using the loss of a given stakeholders as a result of security breakdown. Finally it presents an overview of the applicability of the MFC measure to e-systems. In the conclusion, the chapter criticizes the MFC Cyber Security Measure and presents an overview of different perspectives.


Author(s):  
Neila Rjaibi ◽  
Latifa Ben Arfa Rabai ◽  
Ali Mili

This chapter presents an overview of security challenges in e-Learning systems, and discusses a recent review related research on security risk management approaches in e-Learning to give a proper context to our work. The literature review proves a lack in quantitative security risk management models applied to e-learning system and presents the strengths of the Mean Failure Cost model in quantifying security threats with a financial risk measure. Moreover, we focus on presenting security aspects of e-Learning applications, and analyze its respective stakeholders, security requirements, architectural components and threats. The Mean Failure Cost (MFC) cyber security measure suitable for e-Learning systems is defined and computed. We adapt it to quantify security threats and risk within e-learning systems. It is based on the identification of system's architecture, the well-defined classes of stakeholders, the list of possible threats and vulnerabilities and the specific security requirements related to e-Learning systems and applications.


Sign in / Sign up

Export Citation Format

Share Document