Advertisement

The Mitigation of ICT Risks Using Emitl Tool: An Empirical Study

  • Jabiri Kuwe Bakari
  • Christer Magnusson
  • Charles N. Tarimo
  • Louise Yngström
Part of the IFIP International Federation for Information Processing book series (IFIPAICT, volume 193)

Abstract

As the dependence on ICT in running organisations’ core services is increasing, so is the exposure to the associated risks due to ICT use. In order to meet organisational objectives in ICT dependent organisations, risks due to ICT insecurity need to be addressed effectively and adequately. To achieve this, organisations must have effective means for the management of ICT risks. This involves assessment of the actual exposure to ICT risks relevant to their environment and implementation of relevant countermeasures based on the assessment results. On the contrary, in most organisations, ICT security (or ICT risk management) is perceived by the top management as a technical problem. As a result, measures for ICT risk mitigation that are ultimately put in place in such organisations tend to be inadequate. Furthermore, the traditional way of managing risks by transferring them to the insurance companies is not yet working, as it is difficult to estimate the financial consequences due to ICT-related risks. There is, therefore, a need to have methods or ways which can assist in interpreting ICT risks into a financial context (senior management language) thereby creating a common understanding of ICT risks among technical people and the management within ICT-dependent organisations. With a common understanding, it would be possible to realise a coordinated approach towards ICT risk mitigation.

This paper is an attempt to investigate whether ICT risk mitigation can be enhanced using a customised software tool. A software tool for converting financial terminologies (financial risk exposure) to corresponding ICT security terminologies (countermeasures) is presented. The Estimated Maximum Information Technology Loss (EMitL) tool is investigated for its suitability as an operational tool for the above-mentioned purpose. EMitL is a tool utilised in a framework (Business Requirements on Information Technology Security - BRITS) to bridge the understanding gap between senior management and the technical personnel (when it comes to ICT risk management). This work is based on an empirical study which involved interviews and observations conducted in five non-commercial organisations in Tanzania. The study was designed to establish the state of ICT security management practice in the studied organisations.

The results of the study are being used here to investigate the applicability of the EMitL tool to address the observed state. The results from this study show that it is possible to customise EMitL into a usefully operational tool for interpreting risk exposure due to ICT into corresponding countermeasures. These results underline the need to further improve EMitL for wider use.

Key words

ICT Risk management EMitL tool Countermeasures 

References

  1. Alberts, C., and Dorofee, A., 2003, “Managing Information Security Risks”, the OCTAVE Approach, Addison Wesley, USA.Google Scholar
  2. Anderson, A., and Shain, S., 1991, “Risk management in Information Security hand book, Macmillan publishers Ltd.Google Scholar
  3. Bakari, J. K., 2005, “Towards A Holistic Approach for Managing ICT Security in Developing Countries: A Case Study Of Tanzania”, Ph.L thesis, Department of Computer and Systems Science, SU-KTH, Stockholm.Google Scholar
  4. Bakari, J., Yngström, L., Magnusson, C, and Tarimo, C. N., 2005, “State of ICT Security Management in the Institutions of Higher Learning in Developing Countries: Tanzania Case study”, The 5th IEEE (ICALT 2005), Kaohsiung, Taiwan. Pp. 1007–1011Google Scholar
  5. Baskerville, R., 1993, “Information Systems Security Design Methods: Implication for Information System Development”, ACM Computing Surveys, Vol.25, No.4.Google Scholar
  6. Blakley, B., McDermott, E., and Geer, D., 2001 “Information Security is Information Risk Management” ACM Press, New York, USA.Google Scholar
  7. Frisinger, A., 2001, ‘A Generic Security Evaluation Method for Open Distributed Systems’ Ph.D Thesis, Department of Teleinformatics, Royal Institute of Technology, Sweden.Google Scholar
  8. ISACA, 2005, (April 15, 2005) http://www.isaca.orgGoogle Scholar
  9. ISO 17799, Information technology — Code of practice for information security management ITIL, 2005, (April 15, 2005); http://www.itil.org.uk/Google Scholar
  10. Magnusson, C., 1999 “Hedging Shareholders Value in an IT dependent Business Society” THE FRAMEWORK BRITS, Ph.D Thesis, Department of Computer and Systems Science, University of Stockholm and the Royal Institute of Technology, Stockholm.Google Scholar

Copyright information

© International Federation for Information Processing 2005

Authors and Affiliations

  • Jabiri Kuwe Bakari
    • 1
  • Christer Magnusson
    • 1
  • Charles N. Tarimo
    • 1
  • Louise Yngström
    • 1
  1. 1.Department of Computer and System SciencesStockholm University/Royal Institute of TechnologyKistaSweden

Personalised recommendations