Managing vulnerabilities of information systems to security incidents

  • Authors:
  • Fariborz Farahmand;Shamkant B. Navathe;Philip H. Enslow;Gunter P. Sharp

  • Affiliations:
  • College of Computing, Georgia Institute of Technology;College of Computing, Georgia Institute of Technology;School of Industrial & Systems Engineering Georgia Institute of Technology;College of Computing, Georgia Institute of Technology

  • Venue:
  • ICEC '03 Proceedings of the 5th international conference on Electronic commerce
  • Year:
  • 2003

Quantified Score

Hi-index 0.00

Visualization

Abstract

Information security-conscious managers of organizations have the responsibility to advise their senior management of the level of risks faced by the information systems. This requires managers to conduct vulnerability assessment as the first step of a risk analysis approach. However, a lack of real world data classification of security threats and develops a three-axis view of the threat space. It develops a scheme for probabilistic evaluation of impact of the security threats and proposes a risk management system consisting of a five-step approach. The goal is to assess the expected damages due to attacks, and managing the risk of attacks.