Showing 1 - 10 of 17
In the new Internet economy, risk management plays a critical role to protect the organization and its ability to … perform their business mission, not just its IT assets. Risk management is the process of identifying risk, assessing risk …, and taking steps to reduce risk to an acceptable level. The risk management is an important component of a IT security …
Persistent link: https://www.econbiz.de/10009416495
€™ preference towards risk and towards time). …
Persistent link: https://www.econbiz.de/10009416543
The importance and increasing role of Internet in nowadays business area are officially recognized. No matter the industry a company is operating in, the distribution channels include direct sales through Internet. Following this idea, also the insurance companies decided to sell their insurance...
Persistent link: https://www.econbiz.de/10009416647
Risk approaches in project development led to the integration in the IT project management methodologies and software … development of activities and processes of risk management. The diversity and the advanced level of the used technologies in IT … projects with increasing complexity leads to an exponential diversification of risk factors. The purpose of this research is to …
Persistent link: https://www.econbiz.de/10010592502
processes are analyzed and the collaborative character of risk management is highlighted. A way to control the risk in banking …
Persistent link: https://www.econbiz.de/10010592516
, the risk and control of AIS approach is a central component of processes for IT audit, financial audit and IT Governance …. Recent studies in the literature on the concepts of risk, control and auditing of AIS outline two approaches: (1) a … professional approach in which we can fit ISA, COBIT, IT Risk, COSO and SOX, and (2) a research oriented approach in which we …
Persistent link: https://www.econbiz.de/10010819148
Social engineering is considered to be a taboo subject in nowadays society. It involves the use of social skills or to obtain usernames, passwords, credit card data, or to compromise or altering the information and systems of an entity. Social engineering methods are numerous and people using it...
Persistent link: https://www.econbiz.de/10011165697
The purpose of this paper is to present some directions to perform the risk man-agement for information security. The … existing controls as part of vulnerability assessment. The methods presented contains all the key elements that concurs in risk …, correlation between risks and controls and residual risk computation. …
Persistent link: https://www.econbiz.de/10009416323
The focus of this article lies on synthesizing the requirements a risk management information system should meet in … order to ensure an efficient risk management within a company, but also on presenting the architecture of the information …
Persistent link: https://www.econbiz.de/10009416333
organizations, having such a system is mandatory. Choosing the right product and vendor and using a correct risk management strategy …
Persistent link: https://www.econbiz.de/10009416458