![]() ![]() ![]() In the study, the seventeen methods and thirty one tools which are studied by ENISA on the inventory work are introduced on the basic level. In this study, methodology and tools covered under the Risk Management / Risk Assessment methodology and tools within the European Union Agency For Network and Information Security (ENISA)'s Threat and Risk Management studies are investigated. Particularly Personal Data Protection Law, the legal regulations and the development of cybersecurity risks oblige the public institutions and enterprises to establish information security management systems. It is inevitable that the institutions must use the most appropriate methodology and tools for their own needs and legal responsibilities to provide information security. Both public enterprises and private sector are working on information security to provide information security. Nowadays risks related to information security are increasing each passing day. The comparative study helps in evaluating the models' applicability to an organization and their specific needs. The primary goal of the paper is to identify which information security risk assessment model assesses information security risk effectively. This paper compares and analyzes the different activities, inputs and outputs required by each information security risk assessment models. Information is a critical asset for every organization and hence development and implementation of strategic plans for information security risks mitigation should be an essential part of every organizations operation. They all have very different perspectives and addressing problems differently, though with the same basic goal of risks mitigation in direction of information security. In this regard, numerous risks management frameworks have been developed, and many more are emerging every day. With the increasing need of securing organization's computing environment, a security risks management framework is essentially needed that define the security risks management process accurately. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |