IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

An Analytical Study of Methodologies and Tools for Enterprise Information Security Risk Management

An Analytical Study of Methodologies and Tools for Enterprise Information Security Risk Management
View Sample PDF
Author(s): Jaya Bhattacharjee (Jadavpur University, India), Anirban Sengupta (Jadavpur University, India), Mridul Sankar Barik (Jadavpur University, India)and Chandan Mazumdar (Jadavpur University, India)
Copyright: 2018
Pages: 20
Source title: Information Technology Risk Management and Compliance in Modern Organizations
Source Author(s)/Editor(s): Manish Gupta (State University of New York, Buffalo, USA), Raj Sharman (State University of New York, Buffalo, USA), John Walp (M&T Bank Corporation, USA)and Pavankumar Mulgund (State University of New York, Buffalo, USA)
DOI: 10.4018/978-1-5225-2604-9.ch001

Purchase

View An Analytical Study of Methodologies and Tools for Enterprise Information Security Risk Management on the publisher's website for pricing and purchasing information.

Abstract

An enterprise is characterized by its business processes and supporting ICT infrastructure. Securing these entities is of utmost importance for the survival of an enterprise and continuity of its business operations. In order to secure them, it is important to first detect the risks that can be realized to cause harm to those entities. Over the years, several kinds of security risk analysis methodologies have been proposed. They cater to different categories of enterprise entities and consider varying levels of detail during risk analysis. An enterprise often finds it difficult to select a particular method that will best suit its purpose. This paper attempts to address this problem by presenting a detailed study of existing risk analysis methodologies. The study classifies them into specific categories and performs comparative analyses considering different parameters addressed by the methodologies, including asset type, vulnerabilities, threats, and security controls.

Related Content

Chaymaâ Boutahiri, Ayoub Nouaiti, Aziz Bouazi, Abdallah Marhraoui Hsaini. © 2024. 14 pages.
Imane Cheikh, Khaoula Oulidi Omali, Mohammed Nabil Kabbaj, Mohammed Benbrahim. © 2024. 30 pages.
Tahiri Omar, Herrou Brahim, Sekkat Souhail, Khadiri Hassan. © 2024. 19 pages.
Sekkat Souhail, Ibtissam El Hassani, Anass Cherrafi. © 2024. 14 pages.
Meryeme Bououchma, Brahim Herrou. © 2024. 14 pages.
Touria Jdid, Idriss Chana, Aziz Bouazi, Mohammed Nabil Kabbaj, Mohammed Benbrahim. © 2024. 16 pages.
Houda Bentarki, Abdelkader Makhoute, Tőkési Karoly. © 2024. 10 pages.
Body Bottom