Sunday, January 12, 2020
The Effect of Organisational Structure and Culture on Information Security Risk Processes
Risk assessment is regarded as an integral part of any information security management framework. This is because an information security management framework exists to enable an organisation to maximise the use of its information within a level of risk that is acceptable to the organisation. In information security management literature risk assessment processes are presented as pivotal to the success of the information security management framework. Risk assessment is used to establish the ISMS, determine the information security risks that an organisation faces, and identify the security countermeasures necessary to reduce the risks to an appropriate level. The emphasis is on an ââ¬Å"appropriate responseâ⬠to the measure of risk where appropriate is considered in the overall context of the organisation. Risk assessment is enmeshed with additional organisational processes that construct what is termed an Information Security Management System (ISMS). An information security management system is primarily described in the information security management standard ISO 27001 [9, clauses 4-8]. It is an abstracted organisational model found in information security management literature which articulates a systematised view of the information security management functions and processes described in much of the information security management literature. The role of an Information Security Management System (ISMS) is to ensure that adequate controls are ââ¬Å"established, implemented, monitored, reviewed and improved, where necessary, to ensure that the specific security and business objectives of an organisation are met. â⬠[8, p. viii]. In this regard, an ISMS is comprised of logical management functions and management processes. The relationship between risk assessment and the other information security management processes is described in Figure One which shows that the processes interact in a continuous loop, termed the Plan-Do-Check-Act cycle (PDCA) or Deming Wheel in security management literature. The dominating decision making processes are risk based and constitute some form of risk assessment or evaluation. However the extent to which the process is a ââ¬Å"technicalâ⬠, standardised one, is highly dependent on the organisational context, as this paper discusses.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.