2004
DOI: 10.1108/09685220410518856
|View full text |Cite
|
Sign up to set email alerts
|

From risk analysis to effective security management: towards an automated approach

Abstract: Effective and risk-free operation of modern information systems relies heavily on security practices and overall information security management. Usually, organizations perform risk analysis in order to adjust their security practices and controls to an acceptable level of risk. One of the various outputs of a risk analysis is a set of recommended practices expressed in high-level statements of a natural language. In order to be applied to the real world, it is necessary to technically implement those requirem… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2007
2007
2015
2015

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(5 citation statements)
references
References 13 publications
0
4
0
Order By: Relevance
“…Tsoumas and Tryfonas (2004) present the case for a stronger set of automated security tools to augment current security systems and practices. They propose a semi-automated approach to, assist security professionals, design all security-related organizational inputs to a set of controls.…”
mentioning
confidence: 99%
“…Tsoumas and Tryfonas (2004) present the case for a stronger set of automated security tools to augment current security systems and practices. They propose a semi-automated approach to, assist security professionals, design all security-related organizational inputs to a set of controls.…”
mentioning
confidence: 99%
“…Tun Lin Moe [5] proposed a set of effective natural disaster risk management framework and approach through the study of public facilities. Vassilis Tsoumas [6] suggested the natural disaster risk management should move towards automation direction. Michael K. Lindell [7] put forward the continuity model about the impact of natural disasters and the consequences.…”
Section: The Research Status Abroadmentioning
confidence: 99%
“…Which security mechanisms are needed can then be planned for, and specific security controls -such as firewalls and filtering routers -can be developed and implemented [30]. Tsoumas and Tryfonas suggests a system to automate some of the development phase of the development life cycle [33]. Their system is top-down, and takes a natural language description of a policy, such as the recommendations from a risk analysis, and creates a formal model of a security policy.…”
Section: Sdlc Development Phasementioning
confidence: 99%