Risk Management Practices in Information Security: Exploring the Status
Quo in the DACH Region
- URL: http://arxiv.org/abs/2003.07674v1
- Date: Wed, 4 Mar 2020 10:11:44 GMT
- Title: Risk Management Practices in Information Security: Exploring the Status
Quo in the DACH Region
- Authors: Michael Brunner, Clemens Sauerwein, Michael Felderer and Ruth Breu
- Abstract summary: Information security risk management aims at ensuring proper protection of information values and information processing systems.
This paper investigates the current state of risk management practices being used in information security management in the DACH region.
- Score: 3.375386983523507
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Information security management aims at ensuring proper protection of
information values and information processing systems (i.e. assets).
Information security risk management techniques are incorporated to deal with
threats and vulnerabilities that impose risks to information security
properties of these assets. This paper investigates the current state of risk
management practices being used in information security management in the DACH
region (Germany, Austria, Switzerland). We used an anonymous online survey
targeting strategic and operative information security and risk managers and
collected data from 26 organizations. We analyzed general practices,
documentation artifacts, patterns of stakeholder collaboration as well as tool
types and data sources used by enterprises to conduct information security
management activities. Our findings show that the state of practice of
information security risk management is in need of improvement. Current
industrial practice heavily relies on manual data collection and complex
potentially subjective decision processes with multiple stakeholders involved.
Dedicated risk management tools and methods are used selectively and neglected
in favor of general-purpose documentation tools and direct communication
between stakeholders. In light of our results we propose guidelines for the
development of risk management practices that are better aligned with the
current operational situation in information security management.
Related papers
- A Personal data Value at Risk Approach [0.0]
This paper proposes a quantitative approach to data protection risk-based compliance from a data controllers perspective.
It aims at proposing a mindset change, where data protection impact assessments can be improved by using data protection analytics, quantitative risk analysis, and calibrating expert opinions.
arXiv Detail & Related papers (2024-11-05T16:09:28Z) - Risk Sources and Risk Management Measures in Support of Standards for General-Purpose AI Systems [2.3266896180922187]
We compile an extensive catalog of risk sources and risk management measures for general-purpose AI systems.
This work involves identifying technical, operational, and societal risks across model development, training, and deployment stages.
The catalog is released under a public domain license for ease of direct use by stakeholders in AI governance and standards.
arXiv Detail & Related papers (2024-10-30T21:32:56Z) - AI Risk Management Should Incorporate Both Safety and Security [185.68738503122114]
We argue that stakeholders in AI risk management should be aware of the nuances, synergies, and interplay between safety and security.
We introduce a unified reference framework to clarify the differences and interplay between AI safety and AI security.
arXiv Detail & Related papers (2024-05-29T21:00:47Z) - Affirmative safety: An approach to risk management for high-risk AI [6.133009503054252]
We argue that entities developing or deploying high-risk AI systems should be required to present evidence of affirmative safety.
We propose a risk management approach for advanced AI in which model developers must provide evidence that their activities keep certain risks below regulator-set thresholds.
arXiv Detail & Related papers (2024-04-14T20:48:55Z) - Layered Security Guidance for Data Asset Management in Additive Manufacturing [0.0]
This paper proposes leveraging the National Institute of Standards and Technology's Cybersecurity Framework to develop layered, risk-based guidance for fulfilling specific security outcomes.
The authors believe implementation of the layered approach would result in value-added, non-redundant security guidance for AM that is consistent with the preexisting guidance.
arXiv Detail & Related papers (2023-09-28T20:48:40Z) - Identity Prove Limited Information Governance Policy against cyber
security persistent threats [0.0]
IDPL applies an information governance based on the ISO/IEC:2022 standard of security and optimum performance.
The company should ensure a right person, a real person, authenticating in real-time.
The company has in-house systems focused on all potential risks to client data and its information system assets.
arXiv Detail & Related papers (2023-09-05T10:00:10Z) - ThreatKG: An AI-Powered System for Automated Open-Source Cyber Threat Intelligence Gathering and Management [65.0114141380651]
ThreatKG is an automated system for OSCTI gathering and management.
It efficiently collects a large number of OSCTI reports from multiple sources.
It uses specialized AI-based techniques to extract high-quality knowledge about various threat entities.
arXiv Detail & Related papers (2022-12-20T16:13:59Z) - Foveate, Attribute, and Rationalize: Towards Physically Safe and
Trustworthy AI [76.28956947107372]
Covertly unsafe text is an area of particular interest, as such text may arise from everyday scenarios and are challenging to detect as harmful.
We propose FARM, a novel framework leveraging external knowledge for trustworthy rationale generation in the context of safety.
Our experiments show that FARM obtains state-of-the-art results on the SafeText dataset, showing absolute improvement in safety classification accuracy by 5.9%.
arXiv Detail & Related papers (2022-12-19T17:51:47Z) - A System for Automated Open-Source Threat Intelligence Gathering and
Management [53.65687495231605]
SecurityKG is a system for automated OSCTI gathering and management.
It uses a combination of AI and NLP techniques to extract high-fidelity knowledge about threat behaviors.
arXiv Detail & Related papers (2021-01-19T18:31:35Z) - Dataset Security for Machine Learning: Data Poisoning, Backdoor Attacks,
and Defenses [150.64470864162556]
This work systematically categorizes and discusses a wide range of dataset vulnerabilities and exploits.
In addition to describing various poisoning and backdoor threat models and the relationships among them, we develop their unified taxonomy.
arXiv Detail & Related papers (2020-12-18T22:38:47Z) - Dos and Don'ts of Machine Learning in Computer Security [74.1816306998445]
Despite great potential, machine learning in security is prone to subtle pitfalls that undermine its performance.
We identify common pitfalls in the design, implementation, and evaluation of learning-based security systems.
We propose actionable recommendations to support researchers in avoiding or mitigating the pitfalls where possible.
arXiv Detail & Related papers (2020-10-19T13:09:31Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.