首页 | 本学科首页   官方微博 | 高级检索  
     


Towards an integrated risk analysis security framework according to a systematic analysis of existing proposals
Authors:Antonio SANTOS-OLMO  Luis Enrique SÁNCHEZ  David G. ROSADO  Manuel A. SERRANO  Carlos BLANCO  Haralambos MOURATIDIS  Eduardo FERNÁNDEZ-MEDINA
Affiliation:1. GSyA Research Group, University of Castilla-La Mancha, Ciudad Real 13071, Spain2. Institute for Analytics and Data Science, University of Essex, Colchester CO4 3SQ, UK3. Alarcos Research Group, University of Castilla-La Mancha, Ciudad Real 13071, Spain4. ISTR Research group, Department of Computer Science and Electronics, University of Cantabria, Santander 39005, Spain
Abstract:The information society depends increasingly on risk assessment and management systems as means to adequately protect its key information assets. The availability of these systems is now vital for the protection and evolution of companies. However, several factors have led to an increasing need for more accurate risk analysis approaches. These are: the speed at which technologies evolve, their global impact and the growing requirement for companies to collaborate. Risk analysis processes must consequently adapt to these new circumstances and new technological paradigms. The objective of this paper is, therefore, to present the results of an exhaustive analysis of the techniques and methods offered by the scientific community with the aim of identifying their main weaknesses and providing a new risk assessment and management process. This analysis was carried out using the systematic review protocol and found that these proposals do not fully meet these new needs. The paper also presents a summary of MARISMA, the risk analysis and management framework designed by our research group. The basis of our framework is the main existing risk standards and proposals, and it seeks to address the weaknesses found in these proposals. MARISMA is in a process of continuous improvement, as is being applied by customers in several European and American countries. It consists of a risk data management module, a methodology for its systematic application and a tool that automates the process.
Keywords:information security management  security system  security risk assessment and management  
点击此处可从《Frontiers of Computer Science》浏览原始摘要信息
点击此处可从《Frontiers of Computer Science》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号