SlideShare a Scribd company logo
1 of 10
Download to read offline
International INTERNATIONAL Journal of Computer JOURNAL Engineering OF and COMPUTER Technology (IJCET), ENGINEERING ISSN 0976-6367(Print), 
& 
ISSN 0976 - 6375(Online), Volume 5, Issue 10, October (2014), pp. 11-20 © IAEME 
TECHNOLOGY (IJCET) 
ISSN 0976 – 6367(Print) 
ISSN 0976 – 6375(Online) 
Volume 5, Issue 10, October (2014), pp. 11-20 
© IAEME: www.iaeme.com/IJCET.asp 
Journal Impact Factor (2014): 8.5328 (Calculated by GISI) 
www.jifactor.com 
11 
 
 
IJCET 
 
© I A E M E 
 
RELATIVE RISK BENCHMARKING ENABLING BETTER 
DECISION MAKING FOR MANAGING INFORMATION 
SECURITY RISKS 
Upasna Saluja1, Norbik Bashah Idris2 
1, 2Faculty of Computing, University of Technology (UTM), Malaysia 
ABSTRACT 
Faced with multiple information security risks, organization need to prioritize which risks to 
address among all risks that affect or have the potential to affect the organization. Organizations 
struggle in this process since the current approaches for comparing risks are rudimentary and rely on 
expert judgment. The research studies the approach to risk prioritization in leading risk management 
methodologies. This paper describes the decision making process which results in the generation of a 
new index “Relative Risk Benchmark” which guides an organization to take informed decisions 
about the allocation of resources towards mitigation of identified risks. RRB is calculated on the 
basis of statistical analysis performed for identified risks observed over time. RRB enables an 
organization to rely on a scientifically derived value of various risks that results in better risk 
prioritization with greater confidence. 
By making the risk related decision making more objective, reducing dependence on expert 
judgment and by improving the overall confidence in decision making, RRB provides a path 
breaking innovation to the field of Information Security Risk Management. Above all, it helps avoid 
wasteful expenditure by reducing the attention of risk assessors to only those risks that matter and 
prioritizing resource optimally based on the scientifically determined relative risk. 
Keywords: Information Security, Risk Management, Statistics, Decision Making Process. 
1. INTRODUCTION TO DECISION MAKING TOWARDS INFO SEC RISK 
MANAGEMENT 
Information security threat environment that organizations face today, is becoming highly 
complex, dynamic and dangerous. The scale, complexity and scope of information security risks 
have gone beyond just hacker and virus attacks on computer systems (Aaron Beach 2009). E.g. the
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), 
ISSN 0976 - 6375(Online), Volume 5, Issue 10, October (2014), pp. 11-20 © IAEME 
recent theft of millions of credit card records from Target company, led to the loss of millions of 
dollars; besides the CIO and CEO lost their jobs (Abrams 2014). In order to avoid putting the 
organisation at risk due to breaches, executives resort to risk management which involves risk 
identification, risk assessments and taking appropriate risk mitigation measures. When faced with 
multiple risks it becomes necessary to get a precise understanding, of how important a particular risk 
is for the organization, when compared to other risks. This paper presents statistical Relative Risk 
Benchmark which enables an organization to make better decisions in prioritizing risks thus 
spending the organization’s limited resources for information security in an optimum manner. 
2. ISSUES WITH CURRENT DECISION MAKING APPROACHES FOR 
ADDRESSING INFORMATION SECURITY RISKS 
12 
 
The researcher studied the approaches of risk prioritization as a part of the existing risk 
management methodologies, in order to understand how these methods address risk prioritization. 
According to Peter et al (Hoh Peter In 2004), there is a dearth of a model to evaluate information 
security risks quantitatively. Organizations struggle with the decision making process when choosing 
which risks to address or how much to allocate towards mitigating an individual risk vis-a-vis other 
risks. 
No existing Risk Assessment methodology enables an organization to compare different risks 
faced by the organization in a scientific or statistical manner. Findings of the study reveal that in 
existing approaches, decisions towards risk prioritization rely on rudimentary methods. The risk 
mitigation recommendations are not easily accepted by stakeholders, since decision making has a 
qualitative basis and is subject to expert judgment and potential bias. 
3. KEY OBJECTIVES : BETTER DECISION MAKING PROCESS FOR ADDRESSING 
INFORMATION SECURITY RISKS – 
This study sought to improve risk related decision making by improving risk prioritization. 
The key objective of the study was to develop a scientific method for risk prioritization in order to 
improve decision making during risk treatment. 
4. STATISTICS BASED INFORMATION SECURITY RISK MANAGEMENT 
METHODOLOGY 
This paper presents the Relative Risk Benchmarking (RRB) approach for better decision 
making in Information Security Risk Management. This approach is based on the statistical 
Information Security Risk Management methodology. Further, it presents the results of 
implementation in an organization which validates key contributions of RRB. The process for 
developing RRB is as follows: 
4.1. Context Establishment 
Establish the context pertinent to the organization and the risk management approach to be 
followed. Define scope, boundaries and risk criteria. 
4.2. SQRC Information Security Risk Identification 
SQRC Methodology involves defining Risk Indicators of Information Technology 
environment. It then builds to a quantitative phase during which SQRC gathers a larger amount of 
data over a period of time on the organization’s risk and consequence indicators determined in the
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), 
ISSN 0976 - 6375(Online), Volume 5, Issue 10, October (2014), pp. 11-20 © IAEME 
first qualitative phase. Key steps of SQRC approach for defining and managing Information Security 
Risk Indicators are: 
4.2.3. Develop SQRC Information Security Risk Indicators 
• Step 1- Consider initial Pool of 43 Risk Indicators defined for IT environment. 
• Step 2 –Conduct Interviews to define Business Relevant Risk Indicators 
• Step 3 – Conduct Interviews to Gather Context and incorporate in Risk Indicators such as: 
Incorporate insights from the context such as Geographical, Operational, Business as well as Risks 
not faced by the Organization but Faced by Peer Organizations, Industry Trends: 
13 
4.2.1. Obtaining Management Support 
4.2.2. Identify a Business Sponsor 
4.2.4. Dealing with Anomalies and Escalations. 
4.2.5. Governance 
4.2.6. Communication and Review 
4.3. Risk Analysis 
 
In the RA phase, SQRC conducts statistical Risk Analysis on the data collected during Risk 
Identification phase. SQRC uses second generation statistical technique known as Partial Least 
Square (Leisch) which is a regression technique under Structural Equation Modeling. PLS creates a 
linear relationship between the explanatory risk indicators (Hill)and on the other hand, response 
variable refer to the consequences observed by an organisation. SQRC fits a model for one or more 
response variables based on explanatory risk indicators. In other words, PLS regression analysis 
creates a linear model: 
Y=XB+E, 
Where, Y is an n case by m variables response matrix, X is an n case by p variables. 
Explanatory matrix, B is a p by m regression coefficient matrix; and E is a noise term for the model 
which has the same dimensions as Y. 
While analyzing, SQRC takes care of model building strategies which include Proportion of 
Variance Explained (PVE) in X and Y, Relationship of Response Scores by Predictor Scores, and 
Correlation Loading Plot to interpret relationships between variables.The model for regression is 
created by considering Parameter Estimates. Parameter estimates result of the model describes the 
relationship between dependent and explanatory variables. 
        	
  
Where,
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), 
ISSN 0976 - 6375(Online), Volume 5, Issue 10, October (2014), pp. 11-20 © IAEME 
14 
 
This helps to create a model for prediction of every dependent variable which is analyzed in 
greater detail during the Risk Evaluation stage. 
4.4. Relative Risk Benchmarking (RRB) for Better Decision Making 
The new index, RRB determines the relative potential of each of the many information 
security risks so that decision making is improved. Relative Risk Benchmark (RRB) accomplishes 
this by identifying the contribution made by each individual predictor variable (Young, 2012) 
towards the statistical model for the selected response variable (impact area). 
Variable Importance in Projection (VIP): In PLS, the statistical technique used by SQRC, the VIP 
values represent the overall contribution of each X-variable to the PLS model, when summed for all 
the components and weighted according to the Y variation by each component. VIP value is 
expressed in percentage to determine the relative contribution of each risk indicator. 
Relative Risks determined through Relative Risk Benchmark (RRB): SQRC takes into consideration 
the variable importance in projection while creating RRB. RRB displays the risk indicators which 
have contributed towards statistical prediction model of the response variable. This prevents wasteful 
use of resources by removing the risk indicators from the list of risks that do not have any influence 
on the area under consideration. The graph displays the percentage of contribution made by different 
explanatory variables (Xi) which contribute towards regression model of response variables (Yj). 
5. CASE STUDY: RELATIVE RISK BENCHMARK 
5.1. Context Establishment 
The proposed methodology, described in Section 4 above, was implemented in a subsidiary 
of a multi-national organisation based in India. This information–centric company provides products 
for equity trading to brokers and stock exchanges. The scope of study included the company’s 
information security environment, and other functions involved in risk management along with 130 
staff members. The environment was observed and relevant data recorded from Jun 2013 to Dec 
2013. 
5.2. Risk Identification: Risk Indicators Determined for the Organization 
Towards risk identification at the organization selected for case study, RRB was implemented 
as described in Section 4. Due to confidentiality reasons, the name of the organization selected for 
Case Study is withheld. The results of the study are summarized below: 
5.2.1. Senior Management Support was obtained for the implementation of Risk Indicators process. 
5.2.2. Development of SQRC Information Security Risk Indicators: In consultation with identified 
internal stakeholders and through review of incidents and audit data, relevant risk reports, industry 
surveys and reports, the study identified 43 risk indicators for IT Environments as covered in the 
tables below.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), 
ISSN 0976 - 6375(Online), Volume 5, Issue 10, October (2014), pp. 11-20 © IAEME 
15 
 
Table 1: Risk Indicators (Explanatory Variables - Xi) 
S N Category 
RI# Risk Indicator 
1 Physical Damage 
X1 Damage or Destruction of equipment or media 
X2 
Natural Disasters (Flood, Earthquake, Volcanic 
phenomenon etc.) 
X3 Fire (Natural or Man-made) 
X4 
Man-made Disaster (Bomb / Terrorist attacks, riots, other 
disruptions) 
X5 Climatic Phenomenon (Dust, Corrosion, Freezing…) 
2 Loss of Essential 
services 
X6 Failure of air-conditioning or water supply system 
X7 Issues due to Power Supply 
X8 Business Disruption due to telecommunications 
3 Technical Issues X9 Failure or degradation of Internet Connectivity 
X10 
System non-availability, System hardware failure or 
Malfunction 
X11 Network equipment failure or Malfunction 
X12 Software Malfunction or Failure 
X13 
Degradation of the information system (due to 
Performance of / capacity) 
X14 Malicious code (Malware) e.g. Virus, Trojan horse 
X15 Obsolence of Hardware including network equipment 
X16 Obsolence of software or applications 
X17 Network performance degradation or connectivity issues 
X18 Damage to Network Cables 
X19 
Deterioration/Loss of storage media (such as Back-up, 
databases and etc.) 
X20 Wireless network issues 
X21 Inadequate vulnerability Management Practices 
X22 
Inadequate maintenance practices and measures for 
technology equipment 
X23 Disturbance due to Radiation 
4 Compromise of 
information 
X24 Social Engineering 
X25 
Physical Theft or robbery of media, documents or 
equipment
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), 
ISSN 0976 - 6375(Online), Volume 5, Issue 10, October (2014), pp. 11-20 © IAEME 
16 
 
X26 
Theft of and/or unauthorized access to information held 
within systems 
X27 Information Retrieval from recycled or discarded media 
X28 Unauthorized Disclosure of confidential information 
X29 Breach of employee's / customer's private information 
X30 
Tampering (unauthorized modification) of Data / 
Hardware / Software 
X31 
Spoofing / impersonation / masquerading / Abuse or 
Forging of Rights 
5 Unauthorized 
actions 
X32 Unauthorized use of systems or internet access 
X33 
Unauthorized downloading or use of unauthorized 
software 
X34 Unauthorized physical access 
X35 Cyber Attack 
X36 Unrestricted use of storage or computing devices 
6 Operational 
Issues 
X37 
Issues due to lack of operational training of staff members 
(e.g. data entry errors, accidental data deletion, information 
sent to wrong recipient) 
X38 
Lack of expertise in technology and security administrators 
( e.g. configuration error) 
X39 
Lack of staff members with required skill or experience 
(Inability to attract, retain or effectively deploy capable) 
X40 
Lack of appropriate workplace health, safety or wellbeing 
measures provided to staff 
X41 Information Security awareness of staff members 
X42 Deterioration of storage media (hard copy documents) 
7 Unauthorized 
actions by Third 
Party 
X43 
Errors or unauthorized action (improper access, disclosure, 
alteration or destruction of information) by third party staff 
members- Vendor / Supplier / outsourced provider. 
A decision was taken to apply second generation regression analyses, which required 
definition of response variables. Information security impact areas were designated as consequence 
indicators and designated as response variables for the statistical regression analysis. 
The study defined the consequence indicators (Y variables) applicable to the context of IT 
enabled environment of organizations. The main concern of the organization was CIA of data as well 
as weaknesses in Infrastructure and organizational processes. Thus the following were selected:
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), 
ISSN 0976 - 6375(Online), Volume 5, Issue 10, October (2014), pp. 11-20 © IAEME 
17 
 
Table 2: Consequence Indicators (Response Variables - Yj) 
Var Area 
Y1 Information Availability 
Y2 Information Confidentiality  Integrity 
Y3 Infrastructure  Organisational Processes 
Data was collected over a seven month period with readings taken every ten days, for both 
explanatory as well as response variables, based on which a data set was prepared for conducting 
data analysis. 
5.2.3. Dealing with Anomalies or Escalations: The study built up a process for dealing with 
anomalies in gathered data and other escalations by assigning responsibilities. 
5.2.4. Governance: This step assigned responsibility for the administration and monitoring of Risk 
Indicators to the risk and compliance head. This step also assigned the responsibility of supplying the 
required data relating to risk indicators to the functions involved in the risk management exercise. 
5.2.5. Communication and Review: 
Executive management to be kept informed on quarterly basis through status reports, The 
study also defined the triggers for escalation as 10% more than baseline, responsibility for 
communication to the functional stakeholders and triggers for escalation as 10% more than baseline. 
5.3. Risk Analysis 
As mentioned above in section 4.3, Risk Analysis was conducted using statistical techniques. 
SQRC used statistical model from PLS analysis to determine values of statistical parameters, out of 
which VIP Variable Importance of Projection (VIP) was processed for eliminating those risk 
indicators that were not relevant to the model. SQRC statistical Risk Analysis resulted in 
determining the contribution made by each Risk Indicator towards the Consequence indicators, (Y1, 
Y2 or Y3). Determining relative contribution provided significant value to the management when 
they needed to take decisions about allocation of resources for future actions of Risk treatment. 
5.4. Objective Results of RRB based Analysis 
Relative Risk Benchmark determined for the organization is presented below as “pie charts”, 
which display the risk indicators that have contributed towards statistical prediction model for the 
chosen response variables. 
5.4.1. Relative Risks Measured through RRB - Y1 (Availability of Information): The Pie chart 
provided below represents the percentage contribution made by 18 relevant risk indicators which 
contributed towards negative impact in terms of Availability of Information (Y1). 
Focus only on risk indicators which had significant influence and prioritize based on the 
percentage of relative risk contribution.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 
ISSN 0976 - 6375(Online), Volume 5, Issue 10, Octo 
 
0976-6367(Print), 
October (2014), pp. 11-20 © IAEME
!!

# 
 
 
 
 
 
 
Figure 1: Relative Risk Benchmark for Y1 
0  
As 
5.4.2. Relative Risks Measured through RRB 
can be seen from the pie chart, SQRC RA resulted in showing that 26 risk indicators are under 
consideration and their relative contribution to the model is given below: 
Figure 2: Relative Risk Benchmark for Y2 Confidentiality and Integrity of Information 
Organization focuses only on 
among them based on the percentage of relative risk contribution. 
18 
 
 
 
 
 
	 
 
 
 
 
 
 
	 
	 
 
 
 
 
 
 
 
 
	 
 
	 
	 
 
 
– Availability of Information 
– Y2 (Confidentiality  Integrity of Information): 
tion - 
26 risk indicators which had significant influence and prioritize
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 
ISSN 0976 - 6375(Online), Volume 5, Issue 10, Octo 
0976-6367(Print), 
October (2014), pp. 11-20 © IAEME 
5.4.3. Relative Risks Measured through RRB 
Similarly SQRC RA for Organizational Processes and Infrastructure 
indicators whose relative contribution 
 
0  
– Y3 (Organizational Processes and Infrastructure): 
showed 13 risk 
Figure 3: Relative Risk Benchmark for Y3 Infrastructure and Organization Processes 
Organization focuses only on 
only and 
prioritize among them based on the percentage of relative risk contribution. 
With the above three set 
decisions when prioritizing risk prioritization 
6. CONTRIBUTION OF RRB 
RRB improves decision making towards risk related decision making since it is a scientific 
index that results in more scientific prioritization of risks 
related decisions on investments related to counter measures. 
data-oriented key-influencers which enable better decision making during relative risk prioritization. 
Even Risk Managers who do not possess high degree of subject matter expertise are able to 
determine how much an individual 
area under review.RRB enables objective risk related prioritization and 
moving away from relying upon merely rudimentary mathematics used in traditional methods 
SQRC RRB Analysis being 
; ves decision making by 
factual analysis thus inspires greater confidence among stakeholders. SQRC RRB 
is gathered from the organisation over a period of time 
prioritization as it captures the right 
snapshot of risk. 
In conclusion, using Relative Risk Benchmark, 
, in more reliable risk 
able to make objective decisions for prioritizing risks and thus allocating 
information security resources. 
methods. 
leads to 
analyses data that 
just a 
RRB is a path breaking innovation which enables organization with a statistical decision 
making process for allocation of resources towards mitigation of identified risks. 
19 
Infrastructureshowed an impact from 
in percentage is given below:- 
ononly on 26 risk indicators which had significant influence 
sets of analyses, the organization was in a better position to make 
during risk treatment. 
risks; executives are able to take better risk 
RRB generates a list of objective and 
anagers risk indicator contributes towards the information security impact 
improves 
based on data collected from within the organisation 
time, thus resulting 
overall picture of the risk environment rather than ju 
a new statistics based index, organizations 
are 
organization’s limited

More Related Content

What's hot

Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldnooralmousa
 
The state of incident response
The state of incident responseThe state of incident response
The state of incident responseAbhishek Sood
 
PTX12_Presentation_George Delikouras AIA
PTX12_Presentation_George Delikouras AIAPTX12_Presentation_George Delikouras AIA
PTX12_Presentation_George Delikouras AIAGeorge Delikouras
 
Advantages of Regression Models Over Expert Judgement for Characterizing Cybe...
Advantages of Regression Models Over Expert Judgement for Characterizing Cybe...Advantages of Regression Models Over Expert Judgement for Characterizing Cybe...
Advantages of Regression Models Over Expert Judgement for Characterizing Cybe...Thomas Lee
 
Discussion 1 due to increase in the number of cyber attacks on th
Discussion 1 due to increase in the number of cyber attacks on thDiscussion 1 due to increase in the number of cyber attacks on th
Discussion 1 due to increase in the number of cyber attacks on thAMMY30
 
Enterprise Risk Management for the Digital Transformation Age
Enterprise Risk Management for the Digital Transformation AgeEnterprise Risk Management for the Digital Transformation Age
Enterprise Risk Management for the Digital Transformation AgeCareer Communications Group
 
Assessing and Managing IT Security Risks
Assessing and Managing IT Security RisksAssessing and Managing IT Security Risks
Assessing and Managing IT Security RisksChris Ross
 
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...FireEye, Inc.
 
case studies on risk management in IT enabled organisation(vadodara)
case studies on risk management in IT enabled organisation(vadodara)case studies on risk management in IT enabled organisation(vadodara)
case studies on risk management in IT enabled organisation(vadodara)ishan parikh production
 
Making the Business Case for Security Investment
Making the Business Case for Security InvestmentMaking the Business Case for Security Investment
Making the Business Case for Security InvestmentRoger Johnston
 
White paper pragmatic safety solutions
White paper pragmatic safety solutionsWhite paper pragmatic safety solutions
White paper pragmatic safety solutionsCraig Tappel
 
Vskills Certified Network Security Professional Sample Material
Vskills Certified Network Security Professional Sample MaterialVskills Certified Network Security Professional Sample Material
Vskills Certified Network Security Professional Sample MaterialVskills
 
Risk Assessment Case Study
Risk Assessment Case StudyRisk Assessment Case Study
Risk Assessment Case StudyPraveen Vackayil
 
BDI Model with Adaptive Alertness through Situational Awareness
BDI Model with Adaptive Alertness through Situational AwarenessBDI Model with Adaptive Alertness through Situational Awareness
BDI Model with Adaptive Alertness through Situational AwarenessKarlos Svoboda
 
Cybersecurity Incident Management PowerPoint Presentation Slides
Cybersecurity Incident Management PowerPoint Presentation SlidesCybersecurity Incident Management PowerPoint Presentation Slides
Cybersecurity Incident Management PowerPoint Presentation SlidesSlideTeam
 
From checkboxes to frameworks
From checkboxes to frameworksFrom checkboxes to frameworks
From checkboxes to frameworksAndréanne Clarke
 
Sans survey - maturing - specializing-incident-response-capabilities-needed-p...
Sans survey - maturing - specializing-incident-response-capabilities-needed-p...Sans survey - maturing - specializing-incident-response-capabilities-needed-p...
Sans survey - maturing - specializing-incident-response-capabilities-needed-p...CMR WORLD TECH
 

What's hot (20)

Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless world
 
The state of incident response
The state of incident responseThe state of incident response
The state of incident response
 
PTX12_Presentation_George Delikouras AIA
PTX12_Presentation_George Delikouras AIAPTX12_Presentation_George Delikouras AIA
PTX12_Presentation_George Delikouras AIA
 
Eco secu infocom
Eco secu infocomEco secu infocom
Eco secu infocom
 
Advantages of Regression Models Over Expert Judgement for Characterizing Cybe...
Advantages of Regression Models Over Expert Judgement for Characterizing Cybe...Advantages of Regression Models Over Expert Judgement for Characterizing Cybe...
Advantages of Regression Models Over Expert Judgement for Characterizing Cybe...
 
Discussion 1 due to increase in the number of cyber attacks on th
Discussion 1 due to increase in the number of cyber attacks on thDiscussion 1 due to increase in the number of cyber attacks on th
Discussion 1 due to increase in the number of cyber attacks on th
 
Hands on IT risk assessment
Hands on IT risk assessmentHands on IT risk assessment
Hands on IT risk assessment
 
Enterprise Risk Management for the Digital Transformation Age
Enterprise Risk Management for the Digital Transformation AgeEnterprise Risk Management for the Digital Transformation Age
Enterprise Risk Management for the Digital Transformation Age
 
Assessing and Managing IT Security Risks
Assessing and Managing IT Security RisksAssessing and Managing IT Security Risks
Assessing and Managing IT Security Risks
 
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
 
case studies on risk management in IT enabled organisation(vadodara)
case studies on risk management in IT enabled organisation(vadodara)case studies on risk management in IT enabled organisation(vadodara)
case studies on risk management in IT enabled organisation(vadodara)
 
Making the Business Case for Security Investment
Making the Business Case for Security InvestmentMaking the Business Case for Security Investment
Making the Business Case for Security Investment
 
White paper pragmatic safety solutions
White paper pragmatic safety solutionsWhite paper pragmatic safety solutions
White paper pragmatic safety solutions
 
Vskills Certified Network Security Professional Sample Material
Vskills Certified Network Security Professional Sample MaterialVskills Certified Network Security Professional Sample Material
Vskills Certified Network Security Professional Sample Material
 
Risk Assessment Case Study
Risk Assessment Case StudyRisk Assessment Case Study
Risk Assessment Case Study
 
BDI Model with Adaptive Alertness through Situational Awareness
BDI Model with Adaptive Alertness through Situational AwarenessBDI Model with Adaptive Alertness through Situational Awareness
BDI Model with Adaptive Alertness through Situational Awareness
 
Cybersecurity Incident Management PowerPoint Presentation Slides
Cybersecurity Incident Management PowerPoint Presentation SlidesCybersecurity Incident Management PowerPoint Presentation Slides
Cybersecurity Incident Management PowerPoint Presentation Slides
 
From checkboxes to frameworks
From checkboxes to frameworksFrom checkboxes to frameworks
From checkboxes to frameworks
 
Risk_Technology
Risk_TechnologyRisk_Technology
Risk_Technology
 
Sans survey - maturing - specializing-incident-response-capabilities-needed-p...
Sans survey - maturing - specializing-incident-response-capabilities-needed-p...Sans survey - maturing - specializing-incident-response-capabilities-needed-p...
Sans survey - maturing - specializing-incident-response-capabilities-needed-p...
 

Viewers also liked

Application of median model and goal programming models for selection of tran...
Application of median model and goal programming models for selection of tran...Application of median model and goal programming models for selection of tran...
Application of median model and goal programming models for selection of tran...IAEME Publication
 
Efficacious electronic voting using biometry
Efficacious electronic voting using biometryEfficacious electronic voting using biometry
Efficacious electronic voting using biometryIAEME Publication
 
Coal an energy source for present and future
Coal an energy source for present and futureCoal an energy source for present and future
Coal an energy source for present and futureIAEME Publication
 
Speed dependent dual caliper action in disc brake
Speed dependent dual caliper action in disc brakeSpeed dependent dual caliper action in disc brake
Speed dependent dual caliper action in disc brakeIAEME Publication
 
A study on antecedents of brand loyalty in the toilet soap market
A study on antecedents of brand loyalty in the toilet soap marketA study on antecedents of brand loyalty in the toilet soap market
A study on antecedents of brand loyalty in the toilet soap marketIAEME Publication
 
Emprendimiento en TICs HubBOG
Emprendimiento en TICs HubBOGEmprendimiento en TICs HubBOG
Emprendimiento en TICs HubBOGHubBOG
 
Senac - Marketing em Plataformas Digitais
Senac - Marketing em Plataformas DigitaisSenac - Marketing em Plataformas Digitais
Senac - Marketing em Plataformas DigitaisMichel Camporeze Téer
 
Mitos ágeis-Semana Acadêmica FACOMP
Mitos ágeis-Semana Acadêmica FACOMPMitos ágeis-Semana Acadêmica FACOMP
Mitos ágeis-Semana Acadêmica FACOMPLuiz Danin
 
Revista 12 artigo 3
Revista 12   artigo 3Revista 12   artigo 3
Revista 12 artigo 3Eric Sanchez
 
Pso based fractional order automatic generation controller for two area power...
Pso based fractional order automatic generation controller for two area power...Pso based fractional order automatic generation controller for two area power...
Pso based fractional order automatic generation controller for two area power...IAEME Publication
 
Diario de un experimento completo
Diario de un experimento completoDiario de un experimento completo
Diario de un experimento completoJudit
 
Кристине
КристинеКристине
КристинеGulad Tro
 
Revista 12 artigo 3
Revista 12   artigo 3Revista 12   artigo 3
Revista 12 artigo 3Eric Sanchez
 

Viewers also liked (20)

Application of median model and goal programming models for selection of tran...
Application of median model and goal programming models for selection of tran...Application of median model and goal programming models for selection of tran...
Application of median model and goal programming models for selection of tran...
 
Efficacious electronic voting using biometry
Efficacious electronic voting using biometryEfficacious electronic voting using biometry
Efficacious electronic voting using biometry
 
Coal an energy source for present and future
Coal an energy source for present and futureCoal an energy source for present and future
Coal an energy source for present and future
 
Speed dependent dual caliper action in disc brake
Speed dependent dual caliper action in disc brakeSpeed dependent dual caliper action in disc brake
Speed dependent dual caliper action in disc brake
 
A study on antecedents of brand loyalty in the toilet soap market
A study on antecedents of brand loyalty in the toilet soap marketA study on antecedents of brand loyalty in the toilet soap market
A study on antecedents of brand loyalty in the toilet soap market
 
20120130406030 2
20120130406030 220120130406030 2
20120130406030 2
 
20320130406006 2-3
20320130406006 2-320320130406006 2-3
20320130406006 2-3
 
Facebook a Belgrano
Facebook a BelgranoFacebook a Belgrano
Facebook a Belgrano
 
Emprendimiento en TICs HubBOG
Emprendimiento en TICs HubBOGEmprendimiento en TICs HubBOG
Emprendimiento en TICs HubBOG
 
Turistas criativos
Turistas criativosTuristas criativos
Turistas criativos
 
EL SEXO CON NATURALIDAD 3 (1º Y 2º)
EL SEXO CON NATURALIDAD 3 (1º Y 2º)EL SEXO CON NATURALIDAD 3 (1º Y 2º)
EL SEXO CON NATURALIDAD 3 (1º Y 2º)
 
Senac - Marketing em Plataformas Digitais
Senac - Marketing em Plataformas DigitaisSenac - Marketing em Plataformas Digitais
Senac - Marketing em Plataformas Digitais
 
Punto 4
Punto 4Punto 4
Punto 4
 
Mitos ágeis-Semana Acadêmica FACOMP
Mitos ágeis-Semana Acadêmica FACOMPMitos ágeis-Semana Acadêmica FACOMP
Mitos ágeis-Semana Acadêmica FACOMP
 
Revista 12 artigo 3
Revista 12   artigo 3Revista 12   artigo 3
Revista 12 artigo 3
 
Pso based fractional order automatic generation controller for two area power...
Pso based fractional order automatic generation controller for two area power...Pso based fractional order automatic generation controller for two area power...
Pso based fractional order automatic generation controller for two area power...
 
Diario de un experimento completo
Diario de un experimento completoDiario de un experimento completo
Diario de un experimento completo
 
Piensa en un numero
Piensa en un numeroPiensa en un numero
Piensa en un numero
 
Кристине
КристинеКристине
Кристине
 
Revista 12 artigo 3
Revista 12   artigo 3Revista 12   artigo 3
Revista 12 artigo 3
 

Similar to Relative risk benchmarking enabling better decision making for managing information security risks

Information Security Risk Analysis Using Analytic Hierarchy Process and Fuzzy...
Information Security Risk Analysis Using Analytic Hierarchy Process and Fuzzy...Information Security Risk Analysis Using Analytic Hierarchy Process and Fuzzy...
Information Security Risk Analysis Using Analytic Hierarchy Process and Fuzzy...IJCSIS Research Publications
 
An Intro to Resolver's Incident Management Application
An Intro to Resolver's Incident Management ApplicationAn Intro to Resolver's Incident Management Application
An Intro to Resolver's Incident Management ApplicationResolver Inc.
 
Information security risk analysis methods and research trends ahp and fuzzy ...
Information security risk analysis methods and research trends ahp and fuzzy ...Information security risk analysis methods and research trends ahp and fuzzy ...
Information security risk analysis methods and research trends ahp and fuzzy ...ijcsit
 
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE Walid.docx
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE  Walid.docxINTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE  Walid.docx
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE Walid.docxMargenePurnell14
 
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE Walid.docx
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE  Walid.docxINTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE  Walid.docx
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE Walid.docxbagotjesusa
 
4Brian DennisonJohn DensonIT454 -1504B-01Mon, 121415.docx
4Brian DennisonJohn DensonIT454 -1504B-01Mon, 121415.docx4Brian DennisonJohn DensonIT454 -1504B-01Mon, 121415.docx
4Brian DennisonJohn DensonIT454 -1504B-01Mon, 121415.docxgilbertkpeters11344
 
Running head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY2.docx
Running head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY2.docxRunning head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY2.docx
Running head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY2.docxhealdkathaleen
 
Guide to Risk Management Framework (RMF)
Guide to Risk Management Framework (RMF)Guide to Risk Management Framework (RMF)
Guide to Risk Management Framework (RMF)MetroStar
 
A MULTI-CRITERIA EVALUATION OF INFORMATION SECURITY CONTROLS USING BOOLEAN FE...
A MULTI-CRITERIA EVALUATION OF INFORMATION SECURITY CONTROLS USING BOOLEAN FE...A MULTI-CRITERIA EVALUATION OF INFORMATION SECURITY CONTROLS USING BOOLEAN FE...
A MULTI-CRITERIA EVALUATION OF INFORMATION SECURITY CONTROLS USING BOOLEAN FE...IJNSA Journal
 
Improving Cyber Readiness with the NIST Cybersecurity Framework
Improving Cyber Readiness with the NIST Cybersecurity FrameworkImproving Cyber Readiness with the NIST Cybersecurity Framework
Improving Cyber Readiness with the NIST Cybersecurity FrameworkWilliam McBorrough
 
Risk Assessment Model and its Integration into an Established Test Process
Risk Assessment Model and its Integration into an Established Test ProcessRisk Assessment Model and its Integration into an Established Test Process
Risk Assessment Model and its Integration into an Established Test Processijtsrd
 
SBIC Report : Transforming Information Security: Future-Proofing Processes
SBIC Report : Transforming Information Security: Future-Proofing ProcessesSBIC Report : Transforming Information Security: Future-Proofing Processes
SBIC Report : Transforming Information Security: Future-Proofing ProcessesEMC
 
Taubenberger
TaubenbergerTaubenberger
Taubenbergeranesah
 
w-cyber-risk-modeling Owasp cyber risk quantification 2018
w-cyber-risk-modeling Owasp cyber risk quantification 2018w-cyber-risk-modeling Owasp cyber risk quantification 2018
w-cyber-risk-modeling Owasp cyber risk quantification 2018Open Security Summit
 
PORM: Predictive Optimization of Risk Management to Control Uncertainty Probl...
PORM: Predictive Optimization of Risk Management to Control Uncertainty Probl...PORM: Predictive Optimization of Risk Management to Control Uncertainty Probl...
PORM: Predictive Optimization of Risk Management to Control Uncertainty Probl...IJECEIAES
 
Top 5 secrets to successfully jumpstarting your cyber-risk program
Top 5 secrets to successfully jumpstarting your cyber-risk programTop 5 secrets to successfully jumpstarting your cyber-risk program
Top 5 secrets to successfully jumpstarting your cyber-risk programPriyanka Aash
 
Attack graph based risk assessment and optimisation approach
Attack graph based risk assessment and optimisation approachAttack graph based risk assessment and optimisation approach
Attack graph based risk assessment and optimisation approachIJNSA Journal
 

Similar to Relative risk benchmarking enabling better decision making for managing information security risks (20)

Information Security Risk Analysis Using Analytic Hierarchy Process and Fuzzy...
Information Security Risk Analysis Using Analytic Hierarchy Process and Fuzzy...Information Security Risk Analysis Using Analytic Hierarchy Process and Fuzzy...
Information Security Risk Analysis Using Analytic Hierarchy Process and Fuzzy...
 
An Intro to Resolver's Incident Management Application
An Intro to Resolver's Incident Management ApplicationAn Intro to Resolver's Incident Management Application
An Intro to Resolver's Incident Management Application
 
Information security risk analysis methods and research trends ahp and fuzzy ...
Information security risk analysis methods and research trends ahp and fuzzy ...Information security risk analysis methods and research trends ahp and fuzzy ...
Information security risk analysis methods and research trends ahp and fuzzy ...
 
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE Walid.docx
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE  Walid.docxINTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE  Walid.docx
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE Walid.docx
 
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE Walid.docx
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE  Walid.docxINTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE  Walid.docx
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE Walid.docx
 
Auditing-Cybersecurity in the enterprise
Auditing-Cybersecurity in the enterpriseAuditing-Cybersecurity in the enterprise
Auditing-Cybersecurity in the enterprise
 
4Brian DennisonJohn DensonIT454 -1504B-01Mon, 121415.docx
4Brian DennisonJohn DensonIT454 -1504B-01Mon, 121415.docx4Brian DennisonJohn DensonIT454 -1504B-01Mon, 121415.docx
4Brian DennisonJohn DensonIT454 -1504B-01Mon, 121415.docx
 
Running head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY2.docx
Running head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY2.docxRunning head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY2.docx
Running head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY2.docx
 
Guide to Risk Management Framework (RMF)
Guide to Risk Management Framework (RMF)Guide to Risk Management Framework (RMF)
Guide to Risk Management Framework (RMF)
 
ADCB Presentation - MENA Bank Tech June 2014 v2
ADCB Presentation - MENA Bank Tech June 2014 v2ADCB Presentation - MENA Bank Tech June 2014 v2
ADCB Presentation - MENA Bank Tech June 2014 v2
 
Information Serurity Risk Assessment Basics
Information Serurity Risk Assessment BasicsInformation Serurity Risk Assessment Basics
Information Serurity Risk Assessment Basics
 
A MULTI-CRITERIA EVALUATION OF INFORMATION SECURITY CONTROLS USING BOOLEAN FE...
A MULTI-CRITERIA EVALUATION OF INFORMATION SECURITY CONTROLS USING BOOLEAN FE...A MULTI-CRITERIA EVALUATION OF INFORMATION SECURITY CONTROLS USING BOOLEAN FE...
A MULTI-CRITERIA EVALUATION OF INFORMATION SECURITY CONTROLS USING BOOLEAN FE...
 
Improving Cyber Readiness with the NIST Cybersecurity Framework
Improving Cyber Readiness with the NIST Cybersecurity FrameworkImproving Cyber Readiness with the NIST Cybersecurity Framework
Improving Cyber Readiness with the NIST Cybersecurity Framework
 
Risk Assessment Model and its Integration into an Established Test Process
Risk Assessment Model and its Integration into an Established Test ProcessRisk Assessment Model and its Integration into an Established Test Process
Risk Assessment Model and its Integration into an Established Test Process
 
SBIC Report : Transforming Information Security: Future-Proofing Processes
SBIC Report : Transforming Information Security: Future-Proofing ProcessesSBIC Report : Transforming Information Security: Future-Proofing Processes
SBIC Report : Transforming Information Security: Future-Proofing Processes
 
Taubenberger
TaubenbergerTaubenberger
Taubenberger
 
w-cyber-risk-modeling Owasp cyber risk quantification 2018
w-cyber-risk-modeling Owasp cyber risk quantification 2018w-cyber-risk-modeling Owasp cyber risk quantification 2018
w-cyber-risk-modeling Owasp cyber risk quantification 2018
 
PORM: Predictive Optimization of Risk Management to Control Uncertainty Probl...
PORM: Predictive Optimization of Risk Management to Control Uncertainty Probl...PORM: Predictive Optimization of Risk Management to Control Uncertainty Probl...
PORM: Predictive Optimization of Risk Management to Control Uncertainty Probl...
 
Top 5 secrets to successfully jumpstarting your cyber-risk program
Top 5 secrets to successfully jumpstarting your cyber-risk programTop 5 secrets to successfully jumpstarting your cyber-risk program
Top 5 secrets to successfully jumpstarting your cyber-risk program
 
Attack graph based risk assessment and optimisation approach
Attack graph based risk assessment and optimisation approachAttack graph based risk assessment and optimisation approach
Attack graph based risk assessment and optimisation approach
 

More from IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

More from IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Recently uploaded

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Recently uploaded (20)

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

Relative risk benchmarking enabling better decision making for managing information security risks

  • 1. International INTERNATIONAL Journal of Computer JOURNAL Engineering OF and COMPUTER Technology (IJCET), ENGINEERING ISSN 0976-6367(Print), & ISSN 0976 - 6375(Online), Volume 5, Issue 10, October (2014), pp. 11-20 © IAEME TECHNOLOGY (IJCET) ISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online) Volume 5, Issue 10, October (2014), pp. 11-20 © IAEME: www.iaeme.com/IJCET.asp Journal Impact Factor (2014): 8.5328 (Calculated by GISI) www.jifactor.com 11 IJCET © I A E M E RELATIVE RISK BENCHMARKING ENABLING BETTER DECISION MAKING FOR MANAGING INFORMATION SECURITY RISKS Upasna Saluja1, Norbik Bashah Idris2 1, 2Faculty of Computing, University of Technology (UTM), Malaysia ABSTRACT Faced with multiple information security risks, organization need to prioritize which risks to address among all risks that affect or have the potential to affect the organization. Organizations struggle in this process since the current approaches for comparing risks are rudimentary and rely on expert judgment. The research studies the approach to risk prioritization in leading risk management methodologies. This paper describes the decision making process which results in the generation of a new index “Relative Risk Benchmark” which guides an organization to take informed decisions about the allocation of resources towards mitigation of identified risks. RRB is calculated on the basis of statistical analysis performed for identified risks observed over time. RRB enables an organization to rely on a scientifically derived value of various risks that results in better risk prioritization with greater confidence. By making the risk related decision making more objective, reducing dependence on expert judgment and by improving the overall confidence in decision making, RRB provides a path breaking innovation to the field of Information Security Risk Management. Above all, it helps avoid wasteful expenditure by reducing the attention of risk assessors to only those risks that matter and prioritizing resource optimally based on the scientifically determined relative risk. Keywords: Information Security, Risk Management, Statistics, Decision Making Process. 1. INTRODUCTION TO DECISION MAKING TOWARDS INFO SEC RISK MANAGEMENT Information security threat environment that organizations face today, is becoming highly complex, dynamic and dangerous. The scale, complexity and scope of information security risks have gone beyond just hacker and virus attacks on computer systems (Aaron Beach 2009). E.g. the
  • 2. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 10, October (2014), pp. 11-20 © IAEME recent theft of millions of credit card records from Target company, led to the loss of millions of dollars; besides the CIO and CEO lost their jobs (Abrams 2014). In order to avoid putting the organisation at risk due to breaches, executives resort to risk management which involves risk identification, risk assessments and taking appropriate risk mitigation measures. When faced with multiple risks it becomes necessary to get a precise understanding, of how important a particular risk is for the organization, when compared to other risks. This paper presents statistical Relative Risk Benchmark which enables an organization to make better decisions in prioritizing risks thus spending the organization’s limited resources for information security in an optimum manner. 2. ISSUES WITH CURRENT DECISION MAKING APPROACHES FOR ADDRESSING INFORMATION SECURITY RISKS 12 The researcher studied the approaches of risk prioritization as a part of the existing risk management methodologies, in order to understand how these methods address risk prioritization. According to Peter et al (Hoh Peter In 2004), there is a dearth of a model to evaluate information security risks quantitatively. Organizations struggle with the decision making process when choosing which risks to address or how much to allocate towards mitigating an individual risk vis-a-vis other risks. No existing Risk Assessment methodology enables an organization to compare different risks faced by the organization in a scientific or statistical manner. Findings of the study reveal that in existing approaches, decisions towards risk prioritization rely on rudimentary methods. The risk mitigation recommendations are not easily accepted by stakeholders, since decision making has a qualitative basis and is subject to expert judgment and potential bias. 3. KEY OBJECTIVES : BETTER DECISION MAKING PROCESS FOR ADDRESSING INFORMATION SECURITY RISKS – This study sought to improve risk related decision making by improving risk prioritization. The key objective of the study was to develop a scientific method for risk prioritization in order to improve decision making during risk treatment. 4. STATISTICS BASED INFORMATION SECURITY RISK MANAGEMENT METHODOLOGY This paper presents the Relative Risk Benchmarking (RRB) approach for better decision making in Information Security Risk Management. This approach is based on the statistical Information Security Risk Management methodology. Further, it presents the results of implementation in an organization which validates key contributions of RRB. The process for developing RRB is as follows: 4.1. Context Establishment Establish the context pertinent to the organization and the risk management approach to be followed. Define scope, boundaries and risk criteria. 4.2. SQRC Information Security Risk Identification SQRC Methodology involves defining Risk Indicators of Information Technology environment. It then builds to a quantitative phase during which SQRC gathers a larger amount of data over a period of time on the organization’s risk and consequence indicators determined in the
  • 3. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 10, October (2014), pp. 11-20 © IAEME first qualitative phase. Key steps of SQRC approach for defining and managing Information Security Risk Indicators are: 4.2.3. Develop SQRC Information Security Risk Indicators • Step 1- Consider initial Pool of 43 Risk Indicators defined for IT environment. • Step 2 –Conduct Interviews to define Business Relevant Risk Indicators • Step 3 – Conduct Interviews to Gather Context and incorporate in Risk Indicators such as: Incorporate insights from the context such as Geographical, Operational, Business as well as Risks not faced by the Organization but Faced by Peer Organizations, Industry Trends: 13 4.2.1. Obtaining Management Support 4.2.2. Identify a Business Sponsor 4.2.4. Dealing with Anomalies and Escalations. 4.2.5. Governance 4.2.6. Communication and Review 4.3. Risk Analysis In the RA phase, SQRC conducts statistical Risk Analysis on the data collected during Risk Identification phase. SQRC uses second generation statistical technique known as Partial Least Square (Leisch) which is a regression technique under Structural Equation Modeling. PLS creates a linear relationship between the explanatory risk indicators (Hill)and on the other hand, response variable refer to the consequences observed by an organisation. SQRC fits a model for one or more response variables based on explanatory risk indicators. In other words, PLS regression analysis creates a linear model: Y=XB+E, Where, Y is an n case by m variables response matrix, X is an n case by p variables. Explanatory matrix, B is a p by m regression coefficient matrix; and E is a noise term for the model which has the same dimensions as Y. While analyzing, SQRC takes care of model building strategies which include Proportion of Variance Explained (PVE) in X and Y, Relationship of Response Scores by Predictor Scores, and Correlation Loading Plot to interpret relationships between variables.The model for regression is created by considering Parameter Estimates. Parameter estimates result of the model describes the relationship between dependent and explanatory variables. Where,
  • 4. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 10, October (2014), pp. 11-20 © IAEME 14 This helps to create a model for prediction of every dependent variable which is analyzed in greater detail during the Risk Evaluation stage. 4.4. Relative Risk Benchmarking (RRB) for Better Decision Making The new index, RRB determines the relative potential of each of the many information security risks so that decision making is improved. Relative Risk Benchmark (RRB) accomplishes this by identifying the contribution made by each individual predictor variable (Young, 2012) towards the statistical model for the selected response variable (impact area). Variable Importance in Projection (VIP): In PLS, the statistical technique used by SQRC, the VIP values represent the overall contribution of each X-variable to the PLS model, when summed for all the components and weighted according to the Y variation by each component. VIP value is expressed in percentage to determine the relative contribution of each risk indicator. Relative Risks determined through Relative Risk Benchmark (RRB): SQRC takes into consideration the variable importance in projection while creating RRB. RRB displays the risk indicators which have contributed towards statistical prediction model of the response variable. This prevents wasteful use of resources by removing the risk indicators from the list of risks that do not have any influence on the area under consideration. The graph displays the percentage of contribution made by different explanatory variables (Xi) which contribute towards regression model of response variables (Yj). 5. CASE STUDY: RELATIVE RISK BENCHMARK 5.1. Context Establishment The proposed methodology, described in Section 4 above, was implemented in a subsidiary of a multi-national organisation based in India. This information–centric company provides products for equity trading to brokers and stock exchanges. The scope of study included the company’s information security environment, and other functions involved in risk management along with 130 staff members. The environment was observed and relevant data recorded from Jun 2013 to Dec 2013. 5.2. Risk Identification: Risk Indicators Determined for the Organization Towards risk identification at the organization selected for case study, RRB was implemented as described in Section 4. Due to confidentiality reasons, the name of the organization selected for Case Study is withheld. The results of the study are summarized below: 5.2.1. Senior Management Support was obtained for the implementation of Risk Indicators process. 5.2.2. Development of SQRC Information Security Risk Indicators: In consultation with identified internal stakeholders and through review of incidents and audit data, relevant risk reports, industry surveys and reports, the study identified 43 risk indicators for IT Environments as covered in the tables below.
  • 5. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 10, October (2014), pp. 11-20 © IAEME 15 Table 1: Risk Indicators (Explanatory Variables - Xi) S N Category RI# Risk Indicator 1 Physical Damage X1 Damage or Destruction of equipment or media X2 Natural Disasters (Flood, Earthquake, Volcanic phenomenon etc.) X3 Fire (Natural or Man-made) X4 Man-made Disaster (Bomb / Terrorist attacks, riots, other disruptions) X5 Climatic Phenomenon (Dust, Corrosion, Freezing…) 2 Loss of Essential services X6 Failure of air-conditioning or water supply system X7 Issues due to Power Supply X8 Business Disruption due to telecommunications 3 Technical Issues X9 Failure or degradation of Internet Connectivity X10 System non-availability, System hardware failure or Malfunction X11 Network equipment failure or Malfunction X12 Software Malfunction or Failure X13 Degradation of the information system (due to Performance of / capacity) X14 Malicious code (Malware) e.g. Virus, Trojan horse X15 Obsolence of Hardware including network equipment X16 Obsolence of software or applications X17 Network performance degradation or connectivity issues X18 Damage to Network Cables X19 Deterioration/Loss of storage media (such as Back-up, databases and etc.) X20 Wireless network issues X21 Inadequate vulnerability Management Practices X22 Inadequate maintenance practices and measures for technology equipment X23 Disturbance due to Radiation 4 Compromise of information X24 Social Engineering X25 Physical Theft or robbery of media, documents or equipment
  • 6. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 10, October (2014), pp. 11-20 © IAEME 16 X26 Theft of and/or unauthorized access to information held within systems X27 Information Retrieval from recycled or discarded media X28 Unauthorized Disclosure of confidential information X29 Breach of employee's / customer's private information X30 Tampering (unauthorized modification) of Data / Hardware / Software X31 Spoofing / impersonation / masquerading / Abuse or Forging of Rights 5 Unauthorized actions X32 Unauthorized use of systems or internet access X33 Unauthorized downloading or use of unauthorized software X34 Unauthorized physical access X35 Cyber Attack X36 Unrestricted use of storage or computing devices 6 Operational Issues X37 Issues due to lack of operational training of staff members (e.g. data entry errors, accidental data deletion, information sent to wrong recipient) X38 Lack of expertise in technology and security administrators ( e.g. configuration error) X39 Lack of staff members with required skill or experience (Inability to attract, retain or effectively deploy capable) X40 Lack of appropriate workplace health, safety or wellbeing measures provided to staff X41 Information Security awareness of staff members X42 Deterioration of storage media (hard copy documents) 7 Unauthorized actions by Third Party X43 Errors or unauthorized action (improper access, disclosure, alteration or destruction of information) by third party staff members- Vendor / Supplier / outsourced provider. A decision was taken to apply second generation regression analyses, which required definition of response variables. Information security impact areas were designated as consequence indicators and designated as response variables for the statistical regression analysis. The study defined the consequence indicators (Y variables) applicable to the context of IT enabled environment of organizations. The main concern of the organization was CIA of data as well as weaknesses in Infrastructure and organizational processes. Thus the following were selected:
  • 7. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 10, October (2014), pp. 11-20 © IAEME 17 Table 2: Consequence Indicators (Response Variables - Yj) Var Area Y1 Information Availability Y2 Information Confidentiality Integrity Y3 Infrastructure Organisational Processes Data was collected over a seven month period with readings taken every ten days, for both explanatory as well as response variables, based on which a data set was prepared for conducting data analysis. 5.2.3. Dealing with Anomalies or Escalations: The study built up a process for dealing with anomalies in gathered data and other escalations by assigning responsibilities. 5.2.4. Governance: This step assigned responsibility for the administration and monitoring of Risk Indicators to the risk and compliance head. This step also assigned the responsibility of supplying the required data relating to risk indicators to the functions involved in the risk management exercise. 5.2.5. Communication and Review: Executive management to be kept informed on quarterly basis through status reports, The study also defined the triggers for escalation as 10% more than baseline, responsibility for communication to the functional stakeholders and triggers for escalation as 10% more than baseline. 5.3. Risk Analysis As mentioned above in section 4.3, Risk Analysis was conducted using statistical techniques. SQRC used statistical model from PLS analysis to determine values of statistical parameters, out of which VIP Variable Importance of Projection (VIP) was processed for eliminating those risk indicators that were not relevant to the model. SQRC statistical Risk Analysis resulted in determining the contribution made by each Risk Indicator towards the Consequence indicators, (Y1, Y2 or Y3). Determining relative contribution provided significant value to the management when they needed to take decisions about allocation of resources for future actions of Risk treatment. 5.4. Objective Results of RRB based Analysis Relative Risk Benchmark determined for the organization is presented below as “pie charts”, which display the risk indicators that have contributed towards statistical prediction model for the chosen response variables. 5.4.1. Relative Risks Measured through RRB - Y1 (Availability of Information): The Pie chart provided below represents the percentage contribution made by 18 relevant risk indicators which contributed towards negative impact in terms of Availability of Information (Y1). Focus only on risk indicators which had significant influence and prioritize based on the percentage of relative risk contribution.
  • 8. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 ISSN 0976 - 6375(Online), Volume 5, Issue 10, Octo 0976-6367(Print), October (2014), pp. 11-20 © IAEME
  • 9. !! # Figure 1: Relative Risk Benchmark for Y1 0 As 5.4.2. Relative Risks Measured through RRB can be seen from the pie chart, SQRC RA resulted in showing that 26 risk indicators are under consideration and their relative contribution to the model is given below: Figure 2: Relative Risk Benchmark for Y2 Confidentiality and Integrity of Information Organization focuses only on among them based on the percentage of relative risk contribution. 18 – Availability of Information – Y2 (Confidentiality Integrity of Information): tion - 26 risk indicators which had significant influence and prioritize
  • 10. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 ISSN 0976 - 6375(Online), Volume 5, Issue 10, Octo 0976-6367(Print), October (2014), pp. 11-20 © IAEME 5.4.3. Relative Risks Measured through RRB Similarly SQRC RA for Organizational Processes and Infrastructure indicators whose relative contribution 0 – Y3 (Organizational Processes and Infrastructure): showed 13 risk Figure 3: Relative Risk Benchmark for Y3 Infrastructure and Organization Processes Organization focuses only on only and prioritize among them based on the percentage of relative risk contribution. With the above three set decisions when prioritizing risk prioritization 6. CONTRIBUTION OF RRB RRB improves decision making towards risk related decision making since it is a scientific index that results in more scientific prioritization of risks related decisions on investments related to counter measures. data-oriented key-influencers which enable better decision making during relative risk prioritization. Even Risk Managers who do not possess high degree of subject matter expertise are able to determine how much an individual area under review.RRB enables objective risk related prioritization and moving away from relying upon merely rudimentary mathematics used in traditional methods SQRC RRB Analysis being ; ves decision making by factual analysis thus inspires greater confidence among stakeholders. SQRC RRB is gathered from the organisation over a period of time prioritization as it captures the right snapshot of risk. In conclusion, using Relative Risk Benchmark, , in more reliable risk able to make objective decisions for prioritizing risks and thus allocating information security resources. methods. leads to analyses data that just a RRB is a path breaking innovation which enables organization with a statistical decision making process for allocation of resources towards mitigation of identified risks. 19 Infrastructureshowed an impact from in percentage is given below:- ononly on 26 risk indicators which had significant influence sets of analyses, the organization was in a better position to make during risk treatment. risks; executives are able to take better risk RRB generates a list of objective and anagers risk indicator contributes towards the information security impact improves based on data collected from within the organisation time, thus resulting overall picture of the risk environment rather than ju a new statistics based index, organizations are organization’s limited
  • 11. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 10, October (2014), pp. 11-20 © IAEME 20 7. REFERENCES [1] Aaron Beach, M. G., and Richard Han (2009). Solutions to Security and Privacy Issues in Mobile Social Networking. 9 International Conference on Computational Science and Engineering. [2] Abrams, R. (2014). Target puts data breach costs at $148 Million and Forecasts Profit Drop. New York Times. [3] Haenlein, M. K., Andreas (2010). semPLS: Structural Equation Modeling Using Partial Least Squares. p. doi:10.1207/s15328031us0304_4: pages: 283–297. [4] Hill, M. (2013) Credit Risk Indicators . [5] Hoh Peter In, Y.-G. K., Taek Lee, Chang-Joo Moon, Yoonjung Jung, Injung Kim (2004). A Security Risk Analysis Model for Information Systems. Third Asian Simulation Conference, AsianSim 2004. [6] Leisch, A. M. a. F. (2012). semPLS: Structural Equation Modeling Using Partial Least Squares. [7] Wyme, L. J. (2007). Statistical Framework for Recreational Water Quality Criteria and Monitoring John Wiley Sons. [8] Young, P. J. (2012). THE USE OF KEY RISK INDICATORS BY BANKS. [9] OPERATIONAL RISK MANAGEMENT TOOL. International conference “Improving Financial institutions: the proper balance between regulation and governance. Helsinki. [10] Adesh Chandra, Anurag Singh and Ishan Rastogi, “Understanding Enterprise Risk Management and Fair Model with the Help of a Case Study”, International Journal of Computer Engineering Technology (IJCET), Volume 3, Issue 3, 2012, pp. 300 - 311, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. [11] Dr. N. Kannan, “Risk and Technology Management in Banking Industry”, International Journal of Management (IJM), Volume 1, Issue 1, 2010, pp. 43 - 58, ISSN Print: 0976-6502, ISSN Online: 0976-6510. [12] M. Karthikeyan, M. Suriya Kumar and Dr. S. Karthikeyan, “A Literature Review on the Data Mining and Information Security”, International Journal of Computer Engineering Technology (IJCET), Volume 3, Issue 1, 2012, pp. 141 - 146, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.