Ionuț, Riza (2017): Risk management from the information security perspective. Published in: Junior Scientific Researcher , Vol. 3, No. 2 (December 2017): pp. 1-8.
Preview |
PDF
MPRA_paper_83659.pdf Download (275kB) | Preview |
Abstract
Risk management has emerged ever since the appearance of human communities and it has developed at a slow rate. Over time, a significant improvement was made, from accepting hazards to the identification, evaluation and control of unwanted events, threat prevention and exploitation of opportunities through scientific risk management actions. The fundamental role of research in cyber security is to concentrate the efforts on those contexts and conditions which determine the way in which key players reach a common understanding of the way to conceive and eventually answer to certain challenges in cyber security. In order to build a clear perception of these effects, this work presents the main elements which define cyber space, to come to the aid of turning the management process into an efficient one, especially when talking about cyber space as a space for conflicts, both economic and political.
Item Type: | MPRA Paper |
---|---|
Original Title: | Risk management from the information security perspective |
English Title: | Risk management from the information security perspective |
Language: | English |
Keywords: | cyber space; risk management; cyber security; information technology; risk evaluation |
Subjects: | M - Business Administration and Business Economics ; Marketing ; Accounting ; Personnel Economics > M1 - Business Administration > M15 - IT Management |
Item ID: | 83659 |
Depositing User: | Mrs Aluculesei Alina |
Date Deposited: | 23 Feb 2018 17:41 |
Last Modified: | 05 Oct 2019 08:46 |
References: | 1. Baicu, F. (2006) Auditul și Securitatea Sistemelor Informatice. Ediția 1. Buсurеştі: Victor. 2. Blank, R. M., Gallagher, P. D. (2012) Guide for Conducting Risk Assessments. Ediția 1. Gaithersburg: NIST Special Publication. 3. Blowers, M. (2015) Evolution of Cyber Technologies and Operations to 2035 Advances in Information Security. Ediția 1. Switzerland: Springer International Publishing. 4. Gibson, W. (1982) Burning Chrome. Ediția 1. New York: HarperCollins Publ. 5. Gibson, W. (1984) Neuromancer. Ediția 1. London: Gollancz. 6. Haimes, Y.Y. (1998) Risk Modeling, Assessment, and Management. Ediția 1. New York: Wiley. 7. Harris, S. (2015) @War: The Rise of the Military-Internet Complex. Ediția 1. New York: Eamon Dolan/Houghton Mifflin Harcourt. 8. Morningstar, C. (2003) The New Media Reader. Ediția 1. Londra: The MIT Press. 9. Schneier, B. (2003) Beyond Fear: Thinking Sensibly About Security in an Uncertain World. Ediția 1. Göttingen: Copernicus. 10. Sfetcu, N. (2016) Cunoaștere și Informații. Ediția 1. Seattle: CreateSpace Independent Publishing Platform. 11. Vаѕіu, I. (1998) Сrіmіnаlіtаtеа іnfοrmаtісă. Ediția 1. Buсurеştі: Editura Nеmіrа. 12. Whitten, A. (1999) Information resources management. Ediția 1. Londra: Ideea Group Publishing. 13. Standard internațional ISO/IEC 27005:2011 - Information security risk management. |
URI: | https://mpra.ub.uni-muenchen.de/id/eprint/83659 |