skip to main content
10.1145/508171.508187acmconferencesArticle/Chapter ViewAbstractPublication PagesnspwConference Proceedingsconference-collections
Article

Information security is information risk management

Published:10 September 2001Publication History

ABSTRACT

Information security is important in proportion to an organization's dependence on information technology. When an organization's information is exposed to risk, the use of information security technology is obviously appropriate. Current information security technology, however, deals with only a small fraction of the problem of information risk. In fact, the evidence increasingly suggests that information security technology does not reduce information risk very effectively.This paper argues that we must reconsider our approach to information security from the ground up if we are to deal effectively with the problem of information risk, and proposes a new model inspired by the history of medicine.

References

  1. {AS} Standards Australia, "AS/NZS 4360:1999 Risk Management", 1999.Google ScholarGoogle Scholar
  2. {CSI} Computer Security Institute and US FBI, "Computer Security Issues & Trends", CSI, 2000.Google ScholarGoogle Scholar
  3. {AFM} Arbaugh, W., Fithen, W., and McHugh, J., "Windows of Vulnerability, a Case Study Analysis", IEEE Computer, IEEE, December, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. {Basel} Bank for International Settlements, "The New Basel Capital Accord", Basel: Bank for International Settlements, 2001.Google ScholarGoogle Scholar
  5. {Bcom} Comments on New Basel Capital Accord, http://www.bis.org/bcbs/cacomments.htmGoogle ScholarGoogle Scholar
  6. {CERT} CERT, CERT Annual Reports, http://www.cert.org/annual_rpts/index.htmlGoogle ScholarGoogle Scholar
  7. {ECov} TechRisk.Law, "e-Coverage", Cincinnati, OH: National Underwriter Company, 2000.Google ScholarGoogle Scholar
  8. {ERisk} Lang, S., Davis, J., Jaye, D., Erwin, D., Mullarney, J., Clarke, L., and Loesch, M., "e-risk: Liabilities in a Wired World", Cincinnati, OH: National Underwriter Company, 2000.Google ScholarGoogle Scholar
  9. {FIPS31} US Department of Commerce/National Bureau of Standards, "Guidelines For Automatic Data Processing Physical Security and Risk Management", 1974.Google ScholarGoogle Scholar
  10. {FIPS191} US Department of Commerce/National Institute of Standards and Technology, "Guideline for the Analysis of Local Area Network Security", 1994.Google ScholarGoogle Scholar
  11. {GAO} US General Accounting Office, "Information Security Risk Assessment: Practices of Leading Organizations", 1999.Google ScholarGoogle Scholar
  12. {Har} Harrington, S., and Niehaus, G., "Risk Management and Insurance", Boston, Irwin/McGraw Hill, 1999.Google ScholarGoogle Scholar
  13. {HPDG} Shannon, M., Wilson, B., and Stang, C. (eds.), "Health Professional's Drug Guide", Upper Saddle River, NJ, Prentice Hall, 2002.Google ScholarGoogle Scholar
  14. {Koll} Koller, G., "Risk Assessment and Decision Making in Business and Industry", Boca Raton, Fla.: CRC Press, 1999.Google ScholarGoogle Scholar
  15. {KBPS} Kolluru, R., Bartell, S., Pitblado, R., and Stricoff, S., "Risk Assessment and Management Handbook for Environmental, Health, and Safety Professionals", Boston: McGraw-Hill, 1996.Google ScholarGoogle Scholar
  16. {Leve} Leveson, N., "Safeware: System Safety and Computers", Reading, Mass.: Addison-Wesley, 1995. Google ScholarGoogle Scholar
  17. {Merl} Merck & Co., "Merck's 1899 Manual", New York, Merck & Co., 1899.Google ScholarGoogle Scholar
  18. {Merl7} Beers, M., and Berkow, R. (eds.), "The Merck Manual of Diagnosis and Therapy", 17th ed., Whitehouse Station, NJ, Merck Research Laboratories, 1999.Google ScholarGoogle Scholar
  19. {NISTRMG} US National Institute of Standards and Technology, "Special Publication 800-30: Risk Management Guide" (Draft), 2001.Google ScholarGoogle Scholar
  20. {OFA} Thomas, R. (ed.), "Old Farmer's Almanac", William Ware & Co., Boston, 1900.Google ScholarGoogle Scholar
  21. {Pelt} Peltier, T., "Information Security Risk Analysis", Boca Raton, Fla: Auerbach Publications, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. {Por} Porter, R., "The Greatest Benefit to Mankind", New York, W.W. Norton & Company, 1997.Google ScholarGoogle Scholar
  23. {Shim} Shimpi, P., "Integrating Corporate Risk Management, New York, Texere, 1999.Google ScholarGoogle Scholar
  24. {Stor} Storey, N., "Safety-Critical Computer Systems", Reading, Mass.: Addison-Wesley, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Information security is information risk management

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in
              • Published in

                cover image ACM Conferences
                NSPW '01: Proceedings of the 2001 workshop on New security paradigms
                September 2001
                157 pages
                ISBN:1581134576
                DOI:10.1145/508171

                Copyright © 2001 ACM

                Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 10 September 2001

                Permissions

                Request permissions about this article.

                Request Permissions

                Check for updates

                Qualifiers

                • Article

                Acceptance Rates

                Overall Acceptance Rate62of170submissions,36%

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader