Essays about: "Dynamic Information Security Risk Management Model"

Found 2 essays containing the words Dynamic Information Security Risk Management Model.

  1. 1. Integrating Trust-Based Adaptive Security Framework with Risk Mitigation to enhance SaaS User Identity and Access Control based on User Behavior

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Johnson Akpotor Scott; [2022]
    Keywords : Risk Assessment; Security countermeasure; Risk Management; Risk Mitigation; Adaptive Security Controls; Threats; Risk; Vulnerabilities; User Behavior Trust Degree; User Behavior Risk Rating; Policy Decision Point; Policy Enforcement Point; User Behavior Trust Model; Adaptive Security Architecture; SaaS; Public Cloud.;

    Abstract : In recent years, the emerging trends in cloud computing technologies have given rise to different computing services through the Internet. Organizations across the globe have seized this opportunity as a critical business driver for computing resource access and utilities that will indeed support significant business operations. READ MORE

  2. 2. Dynamic Risk Management in Information Security : A socio-technical approach to mitigate cyber threats in the financial sector

    University essay from Örebro universitet/Handelshögskolan vid Örebro Universitet

    Author : Johan Lundberg; [2020]
    Keywords : Dynamic Information Security Risk Management Model; DISRMM; Dynamic Risk Management; Adaptive Risk Management; Socio-Technical; Sociotechnical; Social Triggers; Technical Triggers; Information Security; Usability; SEO; Search Engine Optimization; SEAREvasion; SEAR Evasion Approach; Dynamic; Risk Management; Socio-technical Threats; Risk Management Finance; Technical Risk Management Finance; Social Risk Management Finance; Socio-technical Model; Design Science Research.; Dynamisk Riskhantering; Informationssäkerhet; Finans; Finansiell Organisation; Dynamisk Informationssäkerhet; Dynamisk Riskhantering Informationssäkerhet; Sociotekniska Cyberhot; Riskhantering.;

    Abstract : In the last decade, a new wave of socio-technical cyber threats has emerged that is targeting both the technical and social vulnerabilities of organizations and requires fast and efficient threat mitigations. Yet, it is still common that financial organizations rely on yearly reviewed risk management methodologies that are slow and static to mitigate the ever-changing cyber threats. READ MORE