2009
DOI: 10.1007/978-3-642-03848-8_9
|View full text |Cite
|
Sign up to set email alerts
|

Business Process-Based Resource Importance Determination

Abstract: Abstract. Information security risk management (ISRM) heavily depends on realistic impact values representing the resources' importance in the overall organizational context. Although a variety of ISRM approaches have been proposed, well-founded methods that provide an answer to the following question are still missing: How can business processes be used to determine resources' importance in the overall organizational context? We answer this question by measuring the actual importance level of resources based … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2009
2009
2014
2014

Publication Types

Select...
3
3
1

Relationship

4
3

Authors

Journals

citations
Cited by 12 publications
(9 citation statements)
references
References 15 publications
0
9
0
Order By: Relevance
“…Due to the identified shortcomings of existing approaches, and the recurring nature of this step, we developed a methodology [cf. Fenz, Ekelhart and Neubauer, 2009] to automatically determine asset importance values through business process analysis. The following paragraph briefly outlines how we use the method in the context of information security risk management.…”
Section: ) Control Identification and Evaluationmentioning
confidence: 99%
See 1 more Smart Citation
“…Due to the identified shortcomings of existing approaches, and the recurring nature of this step, we developed a methodology [cf. Fenz, Ekelhart and Neubauer, 2009] to automatically determine asset importance values through business process analysis. The following paragraph briefly outlines how we use the method in the context of information security risk management.…”
Section: ) Control Identification and Evaluationmentioning
confidence: 99%
“…The advantages of this asset importance determination approach are: (1) the necessary input data is restricted to machine-interpretable business process representations including required resources and the importance of the business process, and (2) assuming that the required input data is already available, our approach provides ISRM with fast results for resource importance, which are based on the business processes' structure and resource involvement. Details on this approach can be found in Fenz, Ekelhart and Neubauer [2009]. At the moment, the automatic importance determination addresses only the security attribute availability.…”
Section: Business Process Importance Determinationmentioning
confidence: 99%
“…AURUM is a framework for automated information security risk management [6,10,7]. As basis for their research, the authors identify the following questions which have to be addressed by organizations: (1) What are potential threats for my organization?, (2) How probable are these threats?, (3) Which vulnerabilities could be exploited by such threats?, (4) Which controls are required to most effectively mitigate these vulnerabilities?, (5) What is the potential impact of a particular threat?, (6) What is the value of security investments?, and finally (7) In which security solutions is it worth investing?…”
Section: Related Workmentioning
confidence: 99%
“…AURUM: A Framework for Automated Information Security Risk Management [15], [16], [17]. As basis for their research, the authors identify the following questions which have to be addressed by organizations: (1) What are potential threats for my organization?, (2) How probable are these threats?, (3) Which vulnerabilities could be exploited by such threats?, (4) Which controls are required to most effectively mitigate these vulnerabilities?, (5) What is the potential impact of a particular threat?, (6) What is the value of security investments?, and finally (7) In which security solutions is it worth investing?…”
Section: Introductionmentioning
confidence: 99%