Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3590837.3590881acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicimmiConference Proceedingsconference-collections
research-article

IT Security Frameworks: Risk Management Analysis and Solutions

Published: 30 May 2023 Publication History

Abstract

The negative effects of information security events are growing globally due to the substantial growth and organizational reliance on information technology (IT). To resolve the information security attacks, vulnerabilities, threats and breaches, there‘s a need for standards that adapt the best practices so that appropriate security levels are accomplished and IT risk management frameworks demands a great change and thus need of new framework is paramount in current perspective. This paper examines most of the existing IT risk management frameworks by conducting the survey amongst various industries, their team leaders and their IT security team members. Following the detailed analytics of the existing models and discussion of various common control management techniques and challenges, this paper attempts to identify gaps in these models that can be resolved through a new framework that can enhance the security levels in IT sector

References

[1]
Allen, Julia H. (2018): Governing for Enterprise Security. Carnegie Mellon University. Report. https://doi.org/10.1184/R1/6573995.v1 
[2]
Patrick Macharia Njoroge et. Al. A FRAMEWORK FOR EFFECTIVE INFORMATION SECURITY RISK MANAGEMENT IN KENYAN PUBLIC UNIVERSITIES, IJSSIT, Volume IV, ISSUE X, 2019
[3]
Educase, Information Security Governancehttps://www.educause.edu/focus-areas- and-initiatives/ policy-and-security/cybersecurity-program/ resources/information-security-guide/toolkits/information-security-governance
[4]
Diligent (2017), Information Security Governance Best Practices https://www.diligent.com/en- gb/blog /information- security-governance-best-practices/
[5]
ISO/IEC 27001:2005, Information technology — Security techniques — Information security management systems — Requirements https://www.iso.org/standard/42103.html#:∼:text=ISO%2FIEC%2027001%3A2005%20specifies,the%20organization's%20overall%20business%20risks.
[6]
FOUNDATION for POLICY and GOVERNANCE, ISO-31000-2018, https://www.foundpg.com/iso-31000
[7]
NIST US, (2017), Information Security, Managing Information Security Risk Organization, Mission, and Information System View, Special Publication 800-39
[8]
Kidd Chrissy, (2019), BMC Blogs (https://www.bmc.com/blogs/cobit/)

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICIMMI '22: Proceedings of the 4th International Conference on Information Management & Machine Intelligence
December 2022
749 pages
ISBN:9781450399937
DOI:10.1145/3590837
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 30 May 2023

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Assessment model
  2. Audit
  3. Data Privacy
  4. Information security
  5. Security Frameworks

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ICIMMI 2022

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 131
    Total Downloads
  • Downloads (Last 12 months)76
  • Downloads (Last 6 weeks)7
Reflects downloads up to 25 Feb 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media