Skip to main content

Integrated Methodology for Information Security Risk Assessment

  • Conference paper
  • First Online:
Information Technology - New Generations

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 558))

  • 3268 Accesses

Abstract

Information security risk assessment is an important component of information security management. A sound method of risk assessment is critical to accurate evaluation of identified risks and costs associated with information assets. This paper reviews major qualitative and quantitative approaches to assessing information security risks and discusses their strengths and limitations. This paper argues for an optimal method that integrates the strengths of both quantitative calculation and qualitative evaluation for information security risk assessment.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Alberts, C., & Dorofee, A. (2002). Managing information security risks: The OCTAVE approach. Boston: Addison Wesley Longman Publishing Co., Inc..

    Google Scholar 

  2. Alberts, C., Dorofee, A., Stevens, J., & Woody, C. (2003). Introduction to the OCTAVE approach. Retrieved from http://www.cert.org/octave/pubs.html

  3. Anderson, R., & et al. (2013). Measuring the cost of cybercrime. The Economics of Information Security and Privacy. Springer.

    Google Scholar 

  4. Blakley, B., McDerMott, E., & Geer, D. (2002). Information security is risk management. NSPW'0I, September 10–13th, 2002, Cioudcroll, New Mexico, 97–104.

    Google Scholar 

  5. Bodin, L. D., Gordon, L. E., & Loeb, M. P. (2008). Information security and risk management. Communications of the ACM, 51(4), 64–68.

    Article  Google Scholar 

  6. Ghazouani, M., et al. (2014). Information security risk Assessment — A practical approach with a mathematical formulation of risk. International Journal of Computer Applications, 103(8), 36–42.

    Article  Google Scholar 

  7. Gibson, D. (2015). Managing risk in information systems (2nd ed.). Burlington: Jones & Bartlett Learning.

    Google Scholar 

  8. Kiran, K. V. D., et al. (2013). A comparative analysis on risk assessment information security models. International Journal of Computer Applications, 82(9), 41–47.

    Article  Google Scholar 

  9. Karabacak, B., & Sogukpinar, I. (2005). ISRAM: Information security risk analysis method. Computer & Security, 24(2005), 147–159.

    Article  Google Scholar 

  10. NIST. (2012). “Guide for Conducting Risk Assessments” (NIST SP800–30 Revision 1) by NIST (2012). Retrieved from: http://csrc.nist.gov/publications/nistpubs/800-30-rev1/sp800_30_r1.pdf

  11. Stolen, K., den Braber, F., Dimitrakos, T., Fredriksen, T., Gran, B. A., Houmb, S., et al. (2002). Model-based risk assessment – the CORAS approach. Retrieved from http://www.nik.no/2002/Stolen.pdf

  12. Stoneburner, G., Goguen, A., & Feringa, A. (2002). Risk management guide for information technology systems: Recommendations of NIST. Retrieved from http://csrc.nist.gov/publications/nistpubs/800-30/sp800-30.pdf

  13. Suh, B., & Han, I. (2003). The IS risk analysis based on a business model. Information & Management, 41(2003), 149–158.

    Article  Google Scholar 

  14. Vorster, A., & Labuschagne, L. (2005). A framework for comparing different information security risk analysis methodologies. Proceedings of SAICSIT 2005, pp. 95–103.

    Google Scholar 

  15. Wang, J. A. (2005). Information security models and metrics. Proceedings of the 43rd ACM Southeast Conference, March 18–20, 2005, Kennesaw, GA. 178–184.

    Google Scholar 

  16. Whitman, M. E., & Mattord, H. J. (2008). Management of information security (2nd ed.). Boston: Thomson Course Technology.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ping Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Cite this paper

Wang, P., Ratchford, M. (2018). Integrated Methodology for Information Security Risk Assessment. In: Latifi, S. (eds) Information Technology - New Generations. Advances in Intelligent Systems and Computing, vol 558. Springer, Cham. https://doi.org/10.1007/978-3-319-54978-1_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-54978-1_20

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-54977-4

  • Online ISBN: 978-3-319-54978-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics