Abstract
The traditional approach to Information Security Risk Management (ISRM) is to assume that risk can only affect businesses negatively. However, it is interesting to notice that the latest edition of the standard ISO/IEC 27005:2022 Guidance on managing information security risks provides a definition of risk that covers both positive and negative consequences. Hence, present and future business leaders can expect information security professionals in their organisations to report on positive aspects of information security risk in addition to negative risk, which is a rather new and radical idea. Since information security risk assessment has traditionally focused on threats, no guidelines currently exist for how to identify, describe or assess positive risk in the context of ISRM. The aim of this study is to describe an opportunity-based approach to information security risk. In addition, this paper discusses some limitations of how ISO/IEC 27005:2022 defines risk, and hence this paper also proposes a definition of positive risk in the context of ISRM. Finally, some strategies to describe and assess positive risk are described.
Supported by Sykehuspartner Trust.
Supported by the Raksha Project, funded by the Research Council of Norway.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Kitchenham, B.: Procedures for performing systematic reviews. Keele, UK, Keele Univ. 33(2004), 1–26 (2004)
Mills, J., Bonner, A., Francis, K.: The development of constructivist grounded theory. Int J Qual Methods 5, 25–35 (2006)
Whitten, D.: The chief information security officer: An analysis of the skills required for success. Journal Of Computer Information Systems. 48, 15–19 (2008)
Information Standardization: Information security, cybersecurity and privacy protection - Information security management systems - Requirements (2022)
Information Standardization: Risk management - Guidelines (2018)
Information Standardization: Information technology - Security techniques - Information security management systems - Overview and vocabulary (2018)
Information Standardization: Information security, cybersecurity and privacy protection - Guidance on managing information security risks (2022)
Information Standardization: Quality management systems - Requirements (2015)
International Organization for Standardization - 0. Explanatory note and overview on ISO Survey 2021 results. https://www.iso.org/the-iso-survey.html. Accessed 13 Jan 2023
Information Standardization: ISO Guide 73:2009, Risk management - Vocabulary (2009)
Technology Standardization: Technology risk management framework for information systems and organizations (2018). https://doi.org/10.6028/NIST.SP.800-37r2. Accessed 13 Jan 2023
Information Standardization: Risk management - Risk assessment techniques (2019)
Harris, S., Maymi, F.: CISSP All-in-One Exam Guide, 7 th edn. McGraw Hill LLC (2016)
Gregory, P.: CISM Certified Information Security Manager All-in-One Exam Guide. McGraw Hill LLC (2018)
Information Standardization: Information security, cybersecurity and privacy protection - Guidance on managing information security risks (2018)
Mayer, N., Aubert, J., Grandry, E., Feltus, C., Goettelmann, E., Wieringa, R.: An integrated conceptual model for information system security risk management supported by enterprise architecture management. Softw. Syst. Model. 18, 2285–2312 (2019)
Bergström, E., Lundgren, M., Ericson, A.: Revisiting information security risk management challenges: a practice perspective. Inform. Comput. Secur. 27, 358–372 (2019)
Diefenbach, T., Lucke, C., Lechner, U.: Towards an integration of information security management, risk management and enterprise architecture management-a literature review. In: 2019 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), pp. 326–333 (2019)
Abbass, W., Baina, A., Bellafkih, M.: Improvement of information system security risk management. In: 2016 4th IEEE International Colloquium on Information Science and Technology (CiSt), pp. 182–187 (2016)
Fenz, S., Heurix, J., Neubauer, T., Pechstein, F.: Current challenges in information security risk management. Inform. Manage. Comput. Secur. 22, 410–430 (2014)
Tran, D., Jøsang, A.: Information security posture to organize and communicate the information security governance program. In: Proceedings of the 18th European Conference on Management Leadership and Governance, ECMLG 2022, vol. 18, pp. 515–522 (2022)
Aleksandrov, M., Vasiliev, V., Aleksandrova, S.: Implementation of the risk-based approach methodology in information security management systems. In: 2021 International Conference on Quality Management, Transport and Information Security, Information Technologies (IT &QM &IS), pp. 137–139 (2021)
Shamala, P., Ahmad, R., Zolait, A., Sedek, M.: Integrating information quality dimensions into information security risk management (ISRM). J. Inform. Secur. Appl. 36, 1–10 (2017)
Webb, J., Ahmad, A., Maynard, S., Shanks, G.: A situation awareness model for information security risk management. Comput. Security. 44, 1–15 (2014)
Riesco, R., Villagrá, V.: Leveraging cyber threat intelligence for a dynamic risk framework. Int. J. Inf. Secur. 18, 715–739 (2019)
Putra, I., Mutijarsa, K.: Designing information security risk management on bali regional police command center based on ISO 27005. In: 2021 3rd East Indonesia Conference on Computer and Information Technology (EIConCIT), pp. 14–19 (2021)
Le Grand, C.: Positive security, risk management, and compliance. EDPACS 47, 1–10 (2013)
Rajbhandari, L.: Consideration of opportunity and human factor: required paradigm shift for information security risk management. In: 2013 European Intelligence and Security Informatics Conference, pp. 147–150 (2013)
Olsson, R.: In search of opportunity management: is the risk management process enough? Int. J. Project Manage. 25, 745–752 (2007)
Hillson, D.: Extending the risk process to manage opportunities. Int. J. Project Manage. 20, 235–240 (2002)
Ivascu, L., Cioca, L.: Opportunity risk: integrated approach to risk management for creating enterprise opportunities. Adv. Educ. Res. 49, 77–80 (2014)
Purdy, G.: ISO 31000: 2009-setting a new standard for risk management. Risk Anal. An Int. J. 30, 881–886 (2010)
Aven, T.: On the new ISO guide on risk management terminology. Reliab. Eng. Syst. Saf. 96, 719–726 (2011)
Wangen, G., Snekkenes, E.: A taxonomy of challenges in information security risk management. In: Proceeding of Norwegian Information Security Conference/Norsk Informasjonssikkerhetskonferanse-NISK 2013-Stavanger, 18th-20th November 2013 (2013)
Lion, R., Meertens, R.: Security or opportunity: the influence of risk-taking tendency on risk information preference. J. Risk Res. 8, 283–294 (2005)
Axelos. ITIL Foundation, ITIL (ITIL 4 Foundation). The Stationery Office (2020)
Measuring and Managing Information Risk: A FAIR Approach. Butterworth-Heinemann (2014)
Chun Tie, Y., Birks, M., Francis, K.: Grounded theory research: a design framework for novice researchers. SAGE Open Med. 7, 2050312118822927 (2019)
Stol, K., Ralph, P., Fitzgerald, B.: Grounded theory in software engineering research: a critical review and guidelines. In: Proceedings of The 38th International Conference on Software Engineering, pp. 120–131 (2016)
Birks, D., Fernandez, W., Levina, N., Nasirin, S.: Grounded theory method in information systems research: its nature, diversity and opportunities. Eur. J. Inf. Syst. 22, 1–8 (2013)
Tran, D., Jøsang, A.: Business language for information security. In: International Symposium on Human Aspects of Information Security and Assurance, pp. 169–180 (2023)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Tran, D.U., Selnes, S.H., Jøsang, A., Hagen, J. (2024). An Opportunity-Based Approach to Information Security Risk. In: Katsikas, S., et al. Computer Security. ESORICS 2023 International Workshops. ESORICS 2023. Lecture Notes in Computer Science, vol 14399. Springer, Cham. https://doi.org/10.1007/978-3-031-54129-2_1
Download citation
DOI: https://doi.org/10.1007/978-3-031-54129-2_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-54128-5
Online ISBN: 978-3-031-54129-2
eBook Packages: Computer ScienceComputer Science (R0)