Endre søk
RefereraExporteraLink to record
Permanent link

Direct link
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Assessment of Enterprise Information Security: An Architecture Theory Diagram Definition
KTH, Skolan för elektro- och systemteknik (EES), Industriella informations- och styrsystem.
KTH, Skolan för elektro- och systemteknik (EES), Industriella informations- och styrsystem.ORCID-id: 0000-0002-3293-1681
2005 (engelsk)Inngår i: Proceedings CSER 2005, 2005, s. 136-146Konferansepaper, Publicerat paper (Fagfellevurdert)
Abstract [en]

In order to manage and improve something, it is normally necessary to be able to assess the current state of affairs. A problem with assessment, however, is that in order to assess, it is normally necessary to be able to define the assessment topic. These general statements are also true within the area of Enterprise Information Security. Although much has been written on the topic, there is little consensus on what Enterprise Information Security really is. The lack of consensus lessens the credibility of existing assessment approaches.

This paper presents a well-defined, transparent, and quantified method for the assessment of Enterprise Information Security. The method is based on the consolidation of the most prominent sources on the topic and results in a single quantitative estimate of the level of Enterprise Information Security in a company.

The usefulness of the presented method has been verified by a case study at a large European electric utility.

The present paper is a part of an ongoing research project on a credible and cost-effective method for Enterprise Information Security assessment.

sted, utgiver, år, opplag, sider
2005. s. 136-146
HSV kategori
Identifikatorer
URN: urn:nbn:se:kth:diva-8895ISBN: 0-615-12843-2 (tryckt)OAI: oai:DiVA.org:kth-8895DiVA, id: diva2:14375
Konferanse
3rd Annual Conference on Systems Engineering Research
Merknad
QC 20101028Tilgjengelig fra: 2005-12-08 Laget: 2005-12-08 Sist oppdatert: 2018-01-13bibliografisk kontrollert
Inngår i avhandling
1. Assessment of Enterprise Information Security: How to make it Credible and Efficient
Åpne denne publikasjonen i ny fane eller vindu >>Assessment of Enterprise Information Security: How to make it Credible and Efficient
2005 (engelsk)Doktoravhandling, med artikler (Annet vitenskapelig)
Abstract [en]

Information is an important business asset in today’s enterprises. Hence enterprise information security is an important system quality that must be carefully managed. Although enterprise information security is acknowledged as one of the most central areas for enterprise IT management, the topic still lacks adequate support for decision making on top-management level.

This composite thesis consists of four articles which presents the Enterprise Information Security Assessment Method (EISAM), a comprehensive method for assessing the current state of the enterprise information security. The method is useful in helping guide top-management’s decision-making because of the following reasons: 1) it is easy to understand, 2) it is prescriptive, 3) it is credible, and 4) it is efficient.

The assessment result is easy to understand because it presents a quantitative estimate. The result can be presented as an aggregated single value, abstracting the details of the assessment. The result is easy to grasp and enables comparisons both within the organization and in terms of industry in general.

The method is prescriptive since it delivers concrete and traceable measurements. This helps guide top-level management in their decisions regarding enterprise-wide information security by highlighting the areas where improvements efforts are essential.

It is credible for two reasons. Firstly, the method presents an explicit and transparent definition of enterprise information security. Secondly, the method in itself includes an indication of assessment uncertainty, expressed in terms of confidence levels.

The method is efficient because it focuses on important enterprise information security aspects, and because it takes into account how difficult it is to find security related evidence. Being resource sparse it enables assessments to take place regularly, which gives valuable knowledge for long-term decision-making.

The usefulness of the presented method, along with its development, has been verified through empirical studies at a leading electric power company in Europe and through statistical surveys carried out among information security experts in Sweden.

The success from this research should encourage further researcher in using these analysis techniques to guide decisions on other enterprise architecture attributes.

sted, utgiver, år, opplag, sider
Stockholm: KTH, 2005. s. 28
Serie
Trita-ICS, ISSN 1104-3504 ; 0502
Emneord
Enterprise Information Security, Enterprise Architecture, Security Assessment, Information Technology Management
HSV kategori
Identifikatorer
urn:nbn:se:kth:diva-545 (URN)
Disputas
2005-12-16, Sal F2, Lindstedtsvägen 28, Stockholm, 10:00
Opponent
Veileder
Merknad
QC 20101028Tilgjengelig fra: 2005-12-08 Laget: 2005-12-08 Sist oppdatert: 2018-01-13bibliografisk kontrollert

Open Access i DiVA

Fulltekst mangler i DiVA

Andre lenker

CSER 2005

Personposter BETA

Johnson, Pontus

Søk i DiVA

Av forfatter/redaktør
Johansson, ErikJohnson, Pontus
Av organisasjonen

Søk utenfor DiVA

GoogleGoogle Scholar

isbn
urn-nbn

Altmetric

isbn
urn-nbn
Totalt: 198 treff
RefereraExporteraLink to record
Permanent link

Direct link
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf