使用COBIT 5风险和NIST SP 800-30 Rev. 1的信息系统风险场景案例研究

Yose Supriyadi, Charla Wara Hardani
{"title":"使用COBIT 5风险和NIST SP 800-30 Rev. 1的信息系统风险场景案例研究","authors":"Yose Supriyadi, Charla Wara Hardani","doi":"10.1109/ICITISEE.2018.8721034","DOIUrl":null,"url":null,"abstract":"The use of Risk Scenario is key to risk management. From the IT security perspective, risk management is the process of understanding and responding to factors that may lead to a failure in information security of an information system. Risk Scenario needs to be built as a starting point to conduct its risk assessment. Risk Assessment is an essential component of risk management to define appropriate response or security control to handle risk. Risk assessment which involves an understanding of possible risk, knowledge of likely risks and threats, measured assessments of established controls and executed plans to address identified vulnerabilities. To resume the result from risk assessment process in COBIT 5 for Risk known as risk scenario document. This paper discusses how to create a Risk Scenario on a critical application system owned by a government agency as a case study. While NIST SP 800-30 Revision 1 to fulfill risk assessment process. The result is a Risk Scenario document and can be used as a starting point for implementing comprehensive risk management COBIT 5 for Risk framework.","PeriodicalId":180051,"journal":{"name":"2018 3rd International Conference on Information Technology, Information System and Electrical Engineering (ICITISEE)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":"{\"title\":\"Information System Risk Scenario Using COBIT 5 for Risk And NIST SP 800-30 Rev. 1 A Case Study\",\"authors\":\"Yose Supriyadi, Charla Wara Hardani\",\"doi\":\"10.1109/ICITISEE.2018.8721034\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The use of Risk Scenario is key to risk management. From the IT security perspective, risk management is the process of understanding and responding to factors that may lead to a failure in information security of an information system. Risk Scenario needs to be built as a starting point to conduct its risk assessment. Risk Assessment is an essential component of risk management to define appropriate response or security control to handle risk. Risk assessment which involves an understanding of possible risk, knowledge of likely risks and threats, measured assessments of established controls and executed plans to address identified vulnerabilities. To resume the result from risk assessment process in COBIT 5 for Risk known as risk scenario document. This paper discusses how to create a Risk Scenario on a critical application system owned by a government agency as a case study. While NIST SP 800-30 Revision 1 to fulfill risk assessment process. The result is a Risk Scenario document and can be used as a starting point for implementing comprehensive risk management COBIT 5 for Risk framework.\",\"PeriodicalId\":180051,\"journal\":{\"name\":\"2018 3rd International Conference on Information Technology, Information System and Electrical Engineering (ICITISEE)\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"11\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 3rd International Conference on Information Technology, Information System and Electrical Engineering (ICITISEE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICITISEE.2018.8721034\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 3rd International Conference on Information Technology, Information System and Electrical Engineering (ICITISEE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICITISEE.2018.8721034","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 11

摘要

风险情景的使用是风险管理的关键。从IT安全的角度来看,风险管理是了解和应对可能导致信息系统信息安全失败的因素的过程。需要构建风险场景作为进行风险评估的起点。风险评估是风险管理的重要组成部分,用于定义适当的响应或安全控制来处理风险。风险评估包括对可能的风险的理解,对可能的风险和威胁的认识,对已建立的控制和已执行的计划的测量评估,以解决已确定的脆弱性。恢复COBIT 5中风险评估过程的结果,称为风险场景文档。本文以案例研究的形式讨论了如何在政府机构拥有的关键应用系统上创建风险场景。而NIST SP 800-30修订1,以完成风险评估过程。其结果是一个风险场景文档,并且可以用作为风险框架实现全面风险管理COBIT 5的起点。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Information System Risk Scenario Using COBIT 5 for Risk And NIST SP 800-30 Rev. 1 A Case Study
The use of Risk Scenario is key to risk management. From the IT security perspective, risk management is the process of understanding and responding to factors that may lead to a failure in information security of an information system. Risk Scenario needs to be built as a starting point to conduct its risk assessment. Risk Assessment is an essential component of risk management to define appropriate response or security control to handle risk. Risk assessment which involves an understanding of possible risk, knowledge of likely risks and threats, measured assessments of established controls and executed plans to address identified vulnerabilities. To resume the result from risk assessment process in COBIT 5 for Risk known as risk scenario document. This paper discusses how to create a Risk Scenario on a critical application system owned by a government agency as a case study. While NIST SP 800-30 Revision 1 to fulfill risk assessment process. The result is a Risk Scenario document and can be used as a starting point for implementing comprehensive risk management COBIT 5 for Risk framework.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Class Diagram Similarity Measurement: A Different Approach Implementation of QR Code and Imei on Android and Web-Based Student Presence Systems Robustness Analysis of PI Controller to Constant Output Power with Dynamic Load Condition in DC Nanogrid System Indonesian Sign Language Recognition Application For Two-Way Communication Deaf-Mute People Comparison Study of Deep Learning and Time Series for Bioelectric Potential Analysis
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1