Problem analysis of traditional IT-security risk assessment methods - An experience report from the insurance and auditing domain

14Citations
Citations of this article
44Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Traditional information technology (IT) security risk assessment approaches are based on an analysis of events, probabilities and impacts. In practice, security experts often find it difficult to determine IT risks reliably with precision. In this paper, we review the risk determination steps of traditional risk assessment approaches and report on our experience of using such approaches. Our experience is based on performing IT audits and IT business insurance cover assessments within a reinsurance company. The paper concludes with a summary of issues concerning traditional approaches that are related to the identification and evaluation of events, probabilities and impacts. We also conclude that there is a need to develop alternative approaches, and suggest a security requirements-based risk assessment approach without events and probabilities. © 2011 IFIP International Federation for Information Processing.

Cite

CITATION STYLE

APA

Taubenberger, S., Jürjens, J., Yu, Y., & Nuseibeh, B. (2011). Problem analysis of traditional IT-security risk assessment methods - An experience report from the insurance and auditing domain. In IFIP Advances in Information and Communication Technology (Vol. 354 AICT, pp. 259–270). Springer New York LLC. https://doi.org/10.1007/978-3-642-21424-0_21

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free