SlideShare une entreprise Scribd logo
1  sur  11
Télécharger pour lire hors ligne
International Journal of Network Security & Its Applications (IJNSA) Vol. 10, No.5, September 2018
DOI: 10.5121/ijnsa.2018.10502 13
THE EFFECT OF INFORMATION TECHNOLOGY
USING ENTERPRISE SECURITY RISK MANAGEMENT
Michael O. Adekanye1
and Shawon S. M. Rahman, Ph.D.2
1
Address: P.O Box 9201, Trenton NJ 08650, USA
2
Associate Professor, Dept. of Computer Science & Engineering, University of Hawaii-
Hilo, 200 W. Kawili Street, Hilo, HI 96720, USA,
ABSTRACT
The philosophy of Enterprise Security Risk Management (ESRM) drives a risk-based approach to
managing any security risks, physical or logical and holistically applies to every security process. There
are globally established risk principles that are common among any developed risk management standard.
This model associates the relationship of risk principles to the practice of managing security risks. The
ESRM processes, when successfully and consistently adapted to a security program, will define what a
progressive security program looks like, drive strategic through initiatives, build the business
understanding of security’s role to develop a budgeting strategy, and initiate board-level, risk-based
reporting. The management security leader's role in ESRM is to manage risks and unthinkable harm to
enterprise assets and stockholder in partnership with the business leaders whose assets are exposed to
those risks management. ESRM is part of educating business leaders on the realistic of impacts. These
identified risks, presenting any potential strategies to mitigate those impacts, and enacting the option
chosen by the business in line with acceptable levels of business risk tolerance. The present data should be
used to showcase how our service helps identify, evaluate, and mitigate risks at face value that would be
detrimental to a company’s long-term prosperity. We need to show how using our security risk
management will ultimately benefit the company's work by improving policies and procedures and reducing
other expenses through the use of risk principles management.
KEYWORDS
Enterprises Security Risk Management, ESRM, Maturation of a Profession, Unfettered Rules, Risk
Mitigation, Risk Mechanism, Enterprise Risk Management, Risk Principles Management, Manage Security
Programs,
1. INTRODUCTION
The Enterprise Security Risk Management (ESRM) is a new philosophy and methodology for
managing security programs through the use of traditional risk principles. As a philosophy and
life cycle, ESRM is focused on creating a business partnership between security practitioners and
business leaders to more effectively to protect against security risks. The acceptable business
tolerances as defined by business owners and stakeholders. This paper explores the basics gap
between the ESRM philosophy and life cycle and also shows how embracing the ESRM
philosophy and implementation works.
As a security professional, have we noticed that our other company do not always define security
in the same way? Perhaps security interests and business interests have become misaligned.
Based on the new approach from the author Arena[2]. The ESRM has the potential to transform
the practice of any security completely. ESRM is based on an extended method of managing an
effective security program through the use of risk principles management by companies around
the world. The present principle of ESRM principles can change the way we perform our jobs, the
International Journal of Network Security & Its Applications (IJNSA) Vol. 10, No.5, September 2018
14
way we see our roles and the way others see them from another perspective. The ways we protect
our enterprises, our assets, and our employees. And ESRM helps us in our careers, by increasing
our personal and professional satisfaction and by ensuring that security is seen as it deserves to be
as a professional discipline. ESRM can help the organization and our security program to be
successful[3]. Whether the threats are informational, cyber, physical security, asset management,
or business continuity, all were included in the holistic, all-encompassing ESRM approach which
will move our task-based to risk-based security.
As professional security, we may already practice some of the components of ESRM. Many of
the concepts such as risk identification, risk transfer and acceptance, crisis management, and
incident response will be well known to us[3]. Many organizations with a comprehensive, holistic
way that ESRM represents and even fewer that communicate these principles effectively to key
decision-makers. ESRM offers very skills and straightforward, realistic, and actionable approach
dealing effectively with all the distinct types of security risks facing individual as a security
practitioner in the organization[15]. The ESRM is implemented in a life cycle of risk management
including the Asset assessment and prioritization, risk assessment and prioritization, Risk
treatment mitigation and continuous improvement. Throughout the ESRM[7] concepts and
applications, the authors release the tools give the company the materials that will help an
employee to advance individual in the security field, no matter what the situation; if we are a
student, a newcomer, or a seasoned professional.
The realistic case studies with questions to help an individual to assess security program, through-
provoking discussion and questions, useful figures and tables as references for the article[7]
Redefining how security enterprises work, everyone thinks about the role of security in the
enterprise security risk area; the security organization can focus on working in partnership with
business leaders and CIO, including the stakeholders to identify and mitigate the use of security
risk. As we begin to use ESRM incorporation; we will experience greater personal and
professional satisfaction as a security professional, and we will become a recognized and trusted
partner in the business critical effort of protecting our enterprise and all its assets.
2. THE MATURATION OF A PROFESSION
As the supporter of ESRM grew in number and further create a more significant career,
implementing the ideas in our various organizations, the core idea of ESRM continued to grow
and mature. Security practitioners started teaching ESRM educational sessions, as well as writing
white papers, articles, and case studies. They spoke about the driving philosophy of ESRM, and
most importantly, communicated the success stories of implementation and ongoing management
of many companies bringing more converts into the fold [3]. The collective lessons learned from
ESRM adopters, in turn, drove many of us to realign and optimize our departments and individual
functions to be more consultative and tightly tied to our respective business's strategy, providing
more and more real-world success metrics for the ESRM.
2.1. PURSUE CONTINUOUS IMPROVEMENT
Enterprise security risk management effort starts as a discrete project but requires ongoing
consideration [9]. Those charged with security must keep current with threats and trends within
the organization and beyond. Security incidents [18][22]need the proper cause of analysis this
should include team members beyond those directly charged with security. Incidents represent
apparent opportunities to reassess risks and responses, and threat analysis and response plans
should regularly be reviewed, regardless of whether an event has ESRM Principles and policies in
Place.
International Journal of Network Security & Its Applications (IJNSA) Vol. 10, No.5, September 2018
Figure 1: Pursue Continuous Improvement occurred
2.2. UNFETTEREDRULES,BRING
BYOD can be a cost-effective way to allow users to use tools they're more comfortable and
familiar with [4] policies and technical controls to manage those are critical. Left unchecked, they
can result in the loss of sensitive data, such as source code or
corporations think there were immune to hacking or device destruction by a virus, so they forget
to close the back door, leaving backup devices unsecured on filing cabinets or in cubicles, and the
lack of screensaver passwords to s
endpoint security and passive scans suffice
every site vulnerable to cross-site request forgeries, XSS cross
Strong sites required require robust security such as the Open Web Application Security Project
(OWASP) technology[17]. OWASP is a unique software company that positions herself to
provide impartial, information about AppSec to individuals, and corporations, univ
government agencies and departments’ organizations around the world. The company Operated
in a community of like-minded professionals, OWASP issues software tools and knowledge
based documentation on application security
monitoring for threats and understanding new risks.
2.3. THE NECESSARY SKILL S
The ESRM leader used a wide range of skill sets to be to be successful. According to the
author[1], these skills are less related to security knowledge
Leading the enterprise's security risk management effort is about being supportive to the business
objectives and the board’s goals, and aligning the company with those and pushing the program
as part of the board’s overall business aims and objectives
innovative business, we do not have to be a Chief Financial Officer (CFO) or developer or
retailer; what we have to be is a very good generalist and a good leader, somebody who can make
decisions and get people on highly innovative on different functions in the organizations to
engaged in trust[5]. What we are able to provide is the change in management innovation and the
use of an appropriate approach to solve problems.
The implementation of a program involves change, and if we have got a skill set that includes an
understanding of business processes and understanding the business, as we would if we were a
consultant coming in to examine process flows and working relationships, that skill
a risk management program[5] [23]
people in finance we can call on for that skill set. We have worked closely with IT and IT
International Journal of Network Security & Its Applications (IJNSA) Vol. 10, No.5, September 2018
Figure 1: Pursue Continuous Improvement occurred
RING YOUR OWN DEVICE(BYOD)
effective way to allow users to use tools they're more comfortable and
policies and technical controls to manage those are critical. Left unchecked, they
can result in the loss of sensitive data, such as source code or client information. Many
corporations think there were immune to hacking or device destruction by a virus, so they forget
to close the back door, leaving backup devices unsecured on filing cabinets or in cubicles, and the
lack of screensaver passwords to secure laptops and desktops when unattended. Assuming that
endpoint security and passive scans suffice[4]. The prevalence of web applications makes almost
site request forgeries, XSS cross-site scripting[18]
sites required require robust security such as the Open Web Application Security Project
. OWASP is a unique software company that positions herself to
provide impartial, information about AppSec to individuals, and corporations, univ
government agencies and departments’ organizations around the world. The company Operated
minded professionals, OWASP issues software tools and knowledge
based documentation on application security[24] [25]. Networks must be proactive, continually
monitoring for threats and understanding new risks.
SETS
The ESRM leader used a wide range of skill sets to be to be successful. According to the
, these skills are less related to security knowledge than they are in the business world.
Leading the enterprise's security risk management effort is about being supportive to the business
objectives and the board’s goals, and aligning the company with those and pushing the program
erall business aims and objectives[1]. To understand the pure and
innovative business, we do not have to be a Chief Financial Officer (CFO) or developer or
retailer; what we have to be is a very good generalist and a good leader, somebody who can make
sions and get people on highly innovative on different functions in the organizations to
. What we are able to provide is the change in management innovation and the
approach to solve problems.
of a program involves change, and if we have got a skill set that includes an
understanding of business processes and understanding the business, as we would if we were a
consultant coming in to examine process flows and working relationships, that skill set helps with
[5] [23]. Just as significant know who to go to for help; we have
people in finance we can call on for that skill set. We have worked closely with IT and IT
International Journal of Network Security & Its Applications (IJNSA) Vol. 10, No.5, September 2018
15
effective way to allow users to use tools they're more comfortable and
policies and technical controls to manage those are critical. Left unchecked, they
client information. Many
corporations think there were immune to hacking or device destruction by a virus, so they forget
to close the back door, leaving backup devices unsecured on filing cabinets or in cubicles, and the
ecure laptops and desktops when unattended. Assuming that
. The prevalence of web applications makes almost
[18], and more.
sites required require robust security such as the Open Web Application Security Project
. OWASP is a unique software company that positions herself to
provide impartial, information about AppSec to individuals, and corporations, universities,
government agencies and departments’ organizations around the world. The company Operated
minded professionals, OWASP issues software tools and knowledge-
be proactive, continually
The ESRM leader used a wide range of skill sets to be to be successful. According to the
than they are in the business world.
Leading the enterprise's security risk management effort is about being supportive to the business
objectives and the board’s goals, and aligning the company with those and pushing the program
. To understand the pure and
innovative business, we do not have to be a Chief Financial Officer (CFO) or developer or
retailer; what we have to be is a very good generalist and a good leader, somebody who can make
sions and get people on highly innovative on different functions in the organizations to
. What we are able to provide is the change in management innovation and the
of a program involves change, and if we have got a skill set that includes an
understanding of business processes and understanding the business, as we would if we were a
set helps with
. Just as significant know who to go to for help; we have
people in finance we can call on for that skill set. We have worked closely with IT and IT
International Journal of Network Security & Its Applications (IJNSA) Vol. 10, No.5, September 2018
16
development, so if we have any knowledge gap regarding skill sets with IT infrastructure and
technical details. We have got people within the organization that we work with; whom we can
call on[14]. What’s most important is a broader understanding of what is driving and therefore
what can influence the business beyond security and malicious threat [27]concerns that we have
every day.
2.4. COMMUNICATION SKILLS
It’s really about personal ability to communicate, understand how others interact. We are not sure
that’s it is something that it has to be learned, but we think an individual can develop it. The first
skill is to be able to get past the initial mistrust. It’s fostering those relationships and letting those
people know it’s not us coming in and taking our headcount, but the ability to articulate that this
process is for the betterment of the organization[2] [16]. It is not about building our Corporation
or convergence in the sense that we’re going to put two, three departments together it’s the ability
to communicate through and come up with that soft approach and ability to talk business in the
right sense. The skills that help the CSO and CIO communicate the skills throughout the
organization.
2.5. THE BENEFIT OF TECHNOLOGIES ON INFORMATION SECURITY
The technological progress brings clear benefits for the companies and the development of the
profession[12], helping to reduce the costs by increasing the productivity level and enhancing
process automation. However, we must be aware that each of these new technologies has a
common challenge, the security of sensitive data. In the paper, we analyze the data security from
the perspective of these existing and emerging technologies that influence the accounting field,
along with the exposure of the possible impact of security incidents[13]. The international
accounting bodies emphasize the necessity to develop the appropriate skills for protecting the data
and assuring confidentiality, integrity, and availability of the information by using efficient
controls[1]. By adopting these technologies in the accounting field, the risk of sensitive data
exposure increases and this regard the practitioners need to understand the necessity of preventing
security incidents, even more, now as the most significant amount of vulnerable data is produced
by the accounting and financial departments[26].
2.6. FRAMEWORK APPROACH IMPROVEMENT
The organization’s ability to manage risk effectively is to depend on its intentions and its capacity
to achieve those intentions to the highest[7]. The purpose and role are referred to as its risk
management framework and is part of its system of governance and management. The quality of
the structure is important because effective risk management that requires:
a) clear expectations from the top;
b) appropriate capability skills, resources, support
c) sound relationships with
d) stakeholders
e) integration is known of necessary risk management practices into the day to day activities
and accountabilities of the management team
f) a firm commitment to continually learn and improve the risk management framework
should not attempt to replace the natural capability of people to manage risk; instead, it
should enhance an actual good practice among those who have reliable and
comprehensive ideas consistent in dealing with issues
For this to occur and for the required capability to be achieved, the organization requires, such as
International Journal of Network Security & Its Applications (IJNSA) Vol. 10, No.5, September 2018
a) A set of suitable tools
b) A smart and coherent approach to training and communication process tools competently
and consistently and
c) A model approach that signals and reinforces the correct
The typical elements of a framework and an illustration of how this supports the integration and
skill of the risk management process are shown in the table below.
2.7. THE IMPACT OF EDUCATING
The ESRM is a management process used to effectively manage security risks, both proactively
and reactively, across an enterprise setting. ESRM
security-related risks to an organization and within the enterprise’s comp
The management process quantifies threats, establishes mitigation plans, identifies risk
acceptance practices, manages incidents, and guides risk owners in developing remediation
efforts. ESRM involves in educating business leader
presenting potential strategies to mitigate those impacts, and then enacting the option chosen by
the business in line with acceptable levels of risk business with tolerance
discussion into the appropriate context, we want to explain my journey through the security
profession and share why we have been so focused on moving away from the old break glass
when needed approach that so often characterizes my interactions with the non
in my organization, and towards the ESRM approach.
The ESRM is a security program management tool with
direct mission and goals through management methods. Leader's role in ESRM is to manage
security risks in the enterprise assets area. Those business leaders whose assets were exposed to
the risks ought to have skills training in place to make a full impact to identified risks. The
potential strategies to mitigate those impacts, and then enacting the option chosen by the business
in line with acceptable levels of risk business with tolerance. To bring the discussion int
appropriate context, we want to explain our journey through the security profession and share our
thought on why we have been so focused on moving away. New thinking is needed to break away
from an old approach that. Somehow characterizes as often in
International Journal of Network Security & Its Applications (IJNSA) Vol. 10, No.5, September 2018
A smart and coherent approach to training and communication process tools competently
A model approach that signals and reinforces the correct behavior and way of thinking.
The typical elements of a framework and an illustration of how this supports the integration and
skill of the risk management process are shown in the table below.
DUCATING BUSINESS LEADERS ON SECURITY STRATEGY
is a management process used to effectively manage security risks, both proactively
and reactively, across an enterprise setting. ESRM [2] continuously assesses the full scope of
related risks to an organization and within the enterprise’s complete portfolio of assets.
The management process quantifies threats, establishes mitigation plans, identifies risk
acceptance practices, manages incidents, and guides risk owners in developing remediation
efforts. ESRM involves in educating business leaders on the realistic impacts of identified risks,
presenting potential strategies to mitigate those impacts, and then enacting the option chosen by
the business in line with acceptable levels of risk business with tolerance[12]. To bring the
the appropriate context, we want to explain my journey through the security
profession and share why we have been so focused on moving away from the old break glass
when needed approach that so often characterizes my interactions with the non-security func
in my organization, and towards the ESRM approach.
Figure 2 - The ESRM Life Cycle
The ESRM is a security program management tool with detail links and activities to an enterprise
direct mission and goals through management methods. Leader's role in ESRM is to manage
security risks in the enterprise assets area. Those business leaders whose assets were exposed to
training in place to make a full impact to identified risks. The
potential strategies to mitigate those impacts, and then enacting the option chosen by the business
in line with acceptable levels of risk business with tolerance. To bring the discussion int
appropriate context, we want to explain our journey through the security profession and share our
thought on why we have been so focused on moving away. New thinking is needed to break away
from an old approach that. Somehow characterizes as often interactions with the non
International Journal of Network Security & Its Applications (IJNSA) Vol. 10, No.5, September 2018
17
A smart and coherent approach to training and communication process tools competently
d way of thinking.
The typical elements of a framework and an illustration of how this supports the integration and
TRATEGY
is a management process used to effectively manage security risks, both proactively
continuously assesses the full scope of
lete portfolio of assets.
The management process quantifies threats, establishes mitigation plans, identifies risk
acceptance practices, manages incidents, and guides risk owners in developing remediation
s on the realistic impacts of identified risks,
presenting potential strategies to mitigate those impacts, and then enacting the option chosen by
. To bring the
the appropriate context, we want to explain my journey through the security
profession and share why we have been so focused on moving away from the old break glass
security functions
links and activities to an enterprise
direct mission and goals through management methods. Leader's role in ESRM is to manage
security risks in the enterprise assets area. Those business leaders whose assets were exposed to
training in place to make a full impact to identified risks. The
potential strategies to mitigate those impacts, and then enacting the option chosen by the business
in line with acceptable levels of risk business with tolerance. To bring the discussion into the
appropriate context, we want to explain our journey through the security profession and share our
thought on why we have been so focused on moving away. New thinking is needed to break away
teractions with the non-security
International Journal of Network Security & Its Applications (IJNSA) Vol. 10, No.5, September 2018
18
functions in my organization and towards the ESRM approach. This approach is detailed in the
ESRM Life Cycle Model
The ESRM becomes an Australian Secret Intelligence Service (ASIS) strategic priority[14].
Today, every part of the business world is digitized and networked. A few years ago, an
organization may have supported a single network of desktops within the confines of a physical
office. No longer the case nowadays; data is accessed and manipulated from everywhere, not just
through workstations and desktop. Computers in an office, with laptops at home, or even on cell
phones and in airports, cafes, and other public places.E-commerce customers also submit credit
card numbers via web forms without a second thought[7]. As the flexibility and robustness of
digital devices continue to grow, security threats[19][20]are also becoming more sophisticated.
Hackers deploy bots to enact DDoS (Distributed Denial of Service) attacks, and cause mayhem
through pretesting, where they send an email under the guise of an authority figure or business to
infect vulnerable systems with Trojans, viruses, or other malware.
Additionally[1], the prevalence of Internet of Things (IoT) devices opens pathways to database
disaster. Therefore, a new approach to security is necessary. Enterprise security management
looks at policies and infrastructure from a holistic perspective and holds that all parts of an
organization contribute to safety[8]. With this approach, new enterprise tools, such as SIEM
security information and event management platforms, automate the monitoring and management
of threats, software updates, reporting for compliance, and more. In this article, we have
discussed enterprise security management and its derivatives, and explain common setbacks and
difficulties in protecting our enterprise from security breaches[20]. Then, we have explored the
best practices and how software tools can improve our security systems, and offer a heuristic for
choosing the right solution for our organization.
3. HOW TO IMPLEMENT ENTERPRISE SECURITY RISK MANAGEMENT
If enterprise security management provides the organizational structure and culture for enacting
security plans, enterprise security risks management[19] is the process of identifying risks and
eliminates the threats, determining how to mitigate them, and documenting policies and best
practices to proactively and reactively address future occurrences[3]. The approach ESRM
considers a project with its vision, mission, and goals. The concept is to protect the assets of an
entire organization so that it can execute its larger business vision and mission. The purpose of
continually identifies analyses, and responds to risks to the business. The goals create, maintain,
and promote policies and best practices to protect the organization against security risks.
To understand what’s at risk, one must know what assets and critical infrastructure and resources
on have, and why they are essential[9]. Threat Modeling and Assessment and Risk Assessment
very important. These were the reasonable and current security of the enterprise security risk
management. Also, what do we consider our vulnerabilities and what are the risks to each asset?
Who else might want to impede our business? Some significant dangers include the requirement
for SSL and authorization checks and measures against SQL injection.
3.1 RISK MITIGATION ACTION POINTS
Coordinate with the stakeholders to determine how to manage risks and identify security
objectives. Options include stopping risky activities, planning mitigation for security events, or
only accepting the risk. Creating a corporate security policy is essential, and must cover all
aspects and assets of the organization. The enterprise security risk management (ESRM) is a
progressive practice which, when combined with security convergence, these can help
organizations such as my corporation to set up comprehensive SCRM processes. Aspects of
International Journal of Network Security & Its Applications (IJNSA) Vol. 10, No.5, September 2018
19
enterprise security risk management can include Supply chain risk management; Physical asset
protection; Human resource security; Information security[26]; Communications security and
Continuity management. The Organizational behaviors that limit security; Not long ago, we
experience computers with a powered-down modem, and an office with a locked front door
would sufficiently protect our network and data information. But as the innovation progress, we
no longer have access to the model. Instead, today’s security must be strategic, systematic, and
repeatable. They followed ways and many organization sabotage their security; by inviting
problem on their system.
Figure 3: Risk Mitigation Action Points
3.2. THE FRAMEWORK FOR RISK MANAGEMENT
After many years of strategic, tactical, practical experience in evaluating and enhancing structures
for risk management in organizations[9], Broadleaf believes that immediate success depends as
much on the manner in which any changes to a structure are developed and implemented as it
does in the detail of the tools and written materials generated[9]. We strongly recommend to our
clients that we helped through the management of change process, where key internal
stakeholders are carefully involved and engaged in evaluating the existing approach and in
planning how, where and when enhancements will be made. The core of this management of the
change process involves internal stakeholder representatives participating in facilitated gap
analysis and evaluation that leads to a bright and practical enhancement and implementation plan.
To enable those stakeholder representatives to compete effectively, they need to be well informed
on current risk management thinking and shown examples drawn from other organizations of
elements of a risk management framework[3]. The approach has the added benefit that the
participants of this process then become the organization’s Champions who were motivated to
lead the implementation process in their departments and functions. They acted to convince their
superiors of the merits of the approach and stimulate acceptance and use[6]. To be successful and
efficient, management to change attitude requires:
a) An accepted accurate representation of the current arrangements for managing
differences between the forms of risks at present situation.
b) Fundamental concepts of risk management at the desired goals regarding risk
management and the framework process for the clearly understood by those
sponsoring the change.
c) A bright idea and accepted appreciation of the elements of the existing structure
that need to be enhanced or improved and the nature of those changes and any
additional features that need to be created what needs to change
d) Exploration of options, constraints, enablers and critical paths leading to an
appropriate plan of actions with timings
International Journal of Network Security & Its Applications (IJNSA) Vol. 10, No.5, September 2018
e) A clear commitment to the program and its implementation through the
allocation of suitable resources by senior management and by their continued
oversight of progress
Steps can be taken to separate the results from the senior management. Howe
years and numerous attempts, we have found that most efficient approach, and the one that gains
the highest degree of ownership and endorsement, is to involve representatives of senior internal
stakeholders in all the steps over a short spa
Figure 4: The framework for risk management
4. TECHNOLOGICAL INNOVATION
Even though the benefits of the emerging technologies presented above are considered
universally accepted, it is essential to understand the local impact of these technologies, regarding
the accounting profession[6]. Another study concerning the willingness of accountants in rega
to allowing cloud solutions has emphasized that the business shows a high level of interest in the
benefits brought by cloud computing and consider that migration as representing a positive
aspect[1]. However, we must not overlook that the usage of new
existence of prepared professionals that will be able to exploit these resources efficiently.
Based on the highlights the fact that the accounting profession has a significant role in the
information technology and acceptance of
information risk management[1]
intermediary between the IT departments and the administration, by advising the suitable IT
solutions that can add value to the organization, after performing appropriate analyses based on
cost efficiency. The most significant benefits identified in this study are considered to be: a higher
degree of innovation, rapidity and increased accuracy
two critical drawbacks are addressed: the facts that most cloud providers do not offer a solution
for local backup and the rigidity of cloud solution compared with desktop solutions.
International Journal of Network Security & Its Applications (IJNSA) Vol. 10, No.5, September 2018
A clear commitment to the program and its implementation through the
allocation of suitable resources by senior management and by their continued
oversight of progress[13].
Steps can be taken to separate the results from the senior management. However, after many
years and numerous attempts, we have found that most efficient approach, and the one that gains
the highest degree of ownership and endorsement, is to involve representatives of senior internal
stakeholders in all the steps over a short space of time.
Figure 4: The framework for risk management
NNOVATION DECISION MAKING
of the emerging technologies presented above are considered
universally accepted, it is essential to understand the local impact of these technologies, regarding
. Another study concerning the willingness of accountants in rega
to allowing cloud solutions has emphasized that the business shows a high level of interest in the
benefits brought by cloud computing and consider that migration as representing a positive
. However, we must not overlook that the usage of new technologies requires the
existence of prepared professionals that will be able to exploit these resources efficiently.
Based on the highlights the fact that the accounting profession has a significant role in the
information technology and acceptance of emerging technologies, such as cloud accounting and
[1]. The author considers that the accountants should act as an
intermediary between the IT departments and the administration, by advising the suitable IT
dd value to the organization, after performing appropriate analyses based on
cost efficiency. The most significant benefits identified in this study are considered to be: a higher
degree of innovation, rapidity and increased accuracy[7]. By analyzing the challenges presented,
two critical drawbacks are addressed: the facts that most cloud providers do not offer a solution
for local backup and the rigidity of cloud solution compared with desktop solutions.
International Journal of Network Security & Its Applications (IJNSA) Vol. 10, No.5, September 2018
20
A clear commitment to the program and its implementation through the
allocation of suitable resources by senior management and by their continued
ver, after many
years and numerous attempts, we have found that most efficient approach, and the one that gains
the highest degree of ownership and endorsement, is to involve representatives of senior internal
of the emerging technologies presented above are considered
universally accepted, it is essential to understand the local impact of these technologies, regarding
. Another study concerning the willingness of accountants in regards
to allowing cloud solutions has emphasized that the business shows a high level of interest in the
benefits brought by cloud computing and consider that migration as representing a positive
technologies requires the
existence of prepared professionals that will be able to exploit these resources efficiently.
Based on the highlights the fact that the accounting profession has a significant role in the
emerging technologies, such as cloud accounting and
. The author considers that the accountants should act as an
intermediary between the IT departments and the administration, by advising the suitable IT
dd value to the organization, after performing appropriate analyses based on
cost efficiency. The most significant benefits identified in this study are considered to be: a higher
hallenges presented,
two critical drawbacks are addressed: the facts that most cloud providers do not offer a solution
International Journal of Network Security & Its Applications (IJNSA) Vol. 10, No.5, September 2018
Due to the dependency of IT enhancements that can f
organizations, the security aspects of information risk management seem to be the biggest
drawback identified by the researchers in the Asia accounting profession. Accounting
practitioners rely heavily on the security
The IT professionals with the overall safety of the applications and the existence of a disaster
recovery plan are considered to be a key differentiator
management and multi-tenancy issues are deemed to be a significant drawback for the accounting
professionals[10]. This outcome shows that there are differences in emerging information risk
management expectations between the financial and IT departments
selection of the cloud supplier, an aspect that can influence the overall security
solution, in the scenario in which the accounting department should mitigate any possible
migration.
Mobile technologies are being adopted m
emerging technologies presented, a point that can be explained through the general preference of
using Smartphones and tablets[4]
reduced costs, when are used with cloud platforms
differentiator in the current local economic context. However, some of the most addressed
drawbacks and challenges of this technology are limited resources, small screens
connectivity issues. The general trend of adopting the BYOD (Bring Your Own Device) concept
comes with a broad range of security issues that must be addressed, such as physical security of
the device, software vulnerabilities,
and access control.
Figure 5: Technological Innovation Decision Making
5. CONCLUSION
The Enterprise's Security Risk Management (ESRM) is a security program management risk with
a detailed approach that links activities to an enterprise's mission. The business goals
management methodology[15] [21]
enterprise management partnership assets to business leadership. The ESRM which involves in
educational business leadershipon the realistic of impacts. To identify risks with potential
strategies to mitigate those impacts, and then enacting the option of chosen by the business in line
with acceptable levels of risk and resilience with the goal. The most significant, perhaps with the
International Journal of Network Security & Its Applications (IJNSA) Vol. 10, No.5, September 2018
Due to the dependency of IT enhancements that can facilitate the operational processes of
organizations, the security aspects of information risk management seem to be the biggest
drawback identified by the researchers in the Asia accounting profession. Accounting
practitioners rely heavily on the security of data in transit and certifications of the cloud supplier.
The IT professionals with the overall safety of the applications and the existence of a disaster
recovery plan are considered to be a key differentiator[7] Moreover, shared data information ris
tenancy issues are deemed to be a significant drawback for the accounting
. This outcome shows that there are differences in emerging information risk
management expectations between the financial and IT departments when it comes to the
selection of the cloud supplier, an aspect that can influence the overall security
solution, in the scenario in which the accounting department should mitigate any possible
Mobile technologies are being adopted more quickly and efficiently compared with the other
emerging technologies presented, a point that can be explained through the general preference of
[4] Benefits such as continuous access, better connectivity, and
s, when are used with cloud platforms[4] qualifies mobile technologies as a critical
differentiator in the current local economic context. However, some of the most addressed
drawbacks and challenges of this technology are limited resources, small screens
connectivity issues. The general trend of adopting the BYOD (Bring Your Own Device) concept
comes with a broad range of security issues that must be addressed, such as physical security of
the device, software vulnerabilities,
Figure 5: Technological Innovation Decision Making
The Enterprise's Security Risk Management (ESRM) is a security program management risk with
a detailed approach that links activities to an enterprise's mission. The business goals
[15] [21]. The security leadership role in ESRM to manage risks from
enterprise management partnership assets to business leadership. The ESRM which involves in
educational business leadershipon the realistic of impacts. To identify risks with potential
to mitigate those impacts, and then enacting the option of chosen by the business in line
with acceptable levels of risk and resilience with the goal. The most significant, perhaps with the
International Journal of Network Security & Its Applications (IJNSA) Vol. 10, No.5, September 2018
21
acilitate the operational processes of
organizations, the security aspects of information risk management seem to be the biggest
drawback identified by the researchers in the Asia accounting profession. Accounting
of data in transit and certifications of the cloud supplier.
The IT professionals with the overall safety of the applications and the existence of a disaster
Moreover, shared data information risk
tenancy issues are deemed to be a significant drawback for the accounting
. This outcome shows that there are differences in emerging information risk
when it comes to the
selection of the cloud supplier, an aspect that can influence the overall security[27] of the
solution, in the scenario in which the accounting department should mitigate any possible
ore quickly and efficiently compared with the other
emerging technologies presented, a point that can be explained through the general preference of
Benefits such as continuous access, better connectivity, and
qualifies mobile technologies as a critical
differentiator in the current local economic context. However, some of the most addressed
drawbacks and challenges of this technology are limited resources, small screens, and
connectivity issues. The general trend of adopting the BYOD (Bring Your Own Device) concept
comes with a broad range of security issues that must be addressed, such as physical security of
The Enterprise's Security Risk Management (ESRM) is a security program management risk with
a detailed approach that links activities to an enterprise's mission. The business goals through risk
. The security leadership role in ESRM to manage risks from
enterprise management partnership assets to business leadership. The ESRM which involves in
educational business leadershipon the realistic of impacts. To identify risks with potential
to mitigate those impacts, and then enacting the option of chosen by the business in line
with acceptable levels of risk and resilience with the goal. The most significant, perhaps with the
International Journal of Network Security & Its Applications (IJNSA) Vol. 10, No.5, September 2018
22
awareness of enterprises security risks management. In the world of enterprise risk management,
the business owners are the owners of all risks.
Depending on the asset in question, the owner of that asset whether a data hall of information, a
warehouse of human capital, or brand reputation in the organization which determines the
treatment of any risk to that asset[2]. The security practitioner in an ESRM programme is
required by his or her philosophy to ensure that business leaders understand the risks to their
assets. The philosophy drives all parts of the business to recognize and proactively deal with
threats in the management and security departments. This integration provides a stable platform
for the continuous development of a holistically secure enterprise[11]. The analysis of the Risk
Management Approach with the various architecture levels to demonstrate how organizations
could gain from the integration of enterprise risk management. The core levels of the organization
and focusare on their investments to ensure a clear mission of readiness. With correct cyber
health by implementing countermeasures across IT’s enterprises. To ensure mission continuity as
well as develop future state architectures in delivering improved information security[10].
REFERENCES
[1] Al-Htaybat, K. & von Alberti-Alhtaybat, L. (2017) “Big Data and corporate reporting: impacts and
paradoxes”, Accounting, Auditing & Accountability Journal, vol. 30, no.4: 850-873
[2] Arena, M., Arnaboldi, M., &Azzone, G. (2011). Is enterprise risk management real?.Journal of Risk
Research, 14(7), 779-797. doi:10.1080/13669877.2011.571775
[3] Baxter, R., Bedard, J. C., Hoitash, R., &Yezegel, A. (2013). Enterprise Risk Management Program
Quality: Determinants, Value Relevance, and the Financial Crisis. Contemporary Accounting
Research, 30(4), 1264-1295. doi:10.1111/j.1911-3846.2012.01194.x
[4] Bradley, J., Loucks, J., Macaulay, J., Medcalf, R. &Buckalew, L. (2012) „BYOD: A Global
Perspective, Harnessing Employee-Led Innovation”, available online at
http://www.cisco.com/c/dam/en_us/about/ac79/docs/re/BYODHorizons-Global.pdf (accessed March
15th 2017)
[5] Caldarelli, A., Ferri, L. &Maffei, M. (2017) “Cloud Computing Adoption in Italian SMEs: A Focus
on Decision-making and Post-implementation Processes”, Reshaping Accounting and Management
Control Systems, 53-76
[6] Frigo, M. L., &Ubelhart, M. C. (2016). Human capital management: The central element of all risk.
People and Strategy, 39(1), 42–46.
[7] Gupta, S., & Saini, A. K. (2013). Information System Security and Risk Management: Issues and
Impact on Organizations. Global Journal Of Enterprise Information System, 5(1), 31-35.
[8] Huth, C. (2013). The insider threat and employee privacy: An overview of recent case law. Computer
Law & Security Report, 29(4), 368–381. Retrieved from
http://www.sciencedirect.com/science/article/pii/S0267364913001052?np=y
[9] Hwankuk, K., Kyungho, L., &Jongin, L. (2017). A Study on the Impact Analysis of Security Flaws
between Security Controls: An Empirical Analysis of K-ISMS using Case-Control Study. KSII
Transactions On Internet & Information Systems, 11(9), 4588-4608. doi:10.3837/tiis.2017.09.022
[10] National Institute of Standards and Technology. (2010). Guide for Applying the Risk Management
Framework to Federal Information Systems. Special Publication 800-37, Rev 1. (Gaithersburg, MD:
National Institute of Standards and Technology.)
[11] National Institute of Standards and Technology (NIST). (n.d.). Risk management framework
overview. Retrieved from http://csrc.nist.gov/groups/SMA/fisma/framework.html
[12] Petruzzi, J., &Loyear, R. (2016). Improving organisational resilience through enterprise security risk
management. Journal Of Business Continuity & Emergency Planning, 10(1), 44-56.
[13] Ray, Bonnie K; Tao, Shu; Olkhovets, Anatoli; Subramanian, Dharmashankar. EURO Journal on
Decision Processes; Heidelberg Vol. 1, Iss. 3-4,(Nov 2013): 187-203. DOI:10.1007/s40070-013-
0013-6 npKey=5e7ab5151c75b3dbb6d5aa532fa90456ded4a947dcb7c3d74459ee872656c319
[14] Rimböck, A., &Loipersberger, A. (2013). Integral risk management: steps on the way from theory to
practice. Natural Hazards, 67(3), 1075–1082.
[15] Yaraghi, N., & Langhe, R. G. (2011). Critical success factors for risk management systems. Journal
Of Risk Research, 14(5), 551-581. doi:10.1080/13669877.2010.547253
International Journal of Network Security & Its Applications (IJNSA) Vol. 10, No.5, September 2018
23
[16] Loukaka, Alain and Rahman, Shawon; “Discovering New Cyber Protection Approaches From a
Security Professional Prospective”; International Journal of Computer Networks & Communications
(IJCNC) Vol.9, No.4, July 2017
[17] Al-Mamun, Abdullah, Rahman, Shawon and et al;“ Security Analysis of AES and Enhancing its
Security by Modifying S-Box with an Additional Byte ”; International Journal of Computer Networks
& Communications (IJCNC), Vol.9, No.2, March 2017
[18] Opala, Omondi John; Rahman, Shawon; and Alelaiwi, Abdulhameed; “The Influence of Information
Security on the Adoption of Cloud computing: An Exploratory Analysis”, International Journal of
Computer Networks & Communications (IJCNC), Vol.7, No.4, July 2015
[19] Rader, A., Marc and Rahman, Syed (Shawon); “Exploring Historical and Emerging Phishing
Techniques and Mitigating the Associated Security Risks”; International Journal of Network Security
& Its Applications (IJNSA), Vol.5, No.4, July 2013
[20] Opala, John, Omondi and Rahman, Syed (Shawon);“Corporate Role in Protecting Consumers from
the Risk of Identify theft ”; International Journal of Computer Networks & Communications (IJCNC),
Vol.5, No.5, September 2013
[21] Neal, David and Rahman, Syed (Shawon); “Video Surveillance in the Cloud?”; The International
Journal of Cryptography and Information Security (IJCIS), Vol.2, No.3, September 2012
[22] Halton, Michael and Rahman, Syed (Shawon); "The Top 10 Best Cloud-Security Practices in Next-
Generation Networking"; International Journal of Communication Networks and Distributed Systems
(IJCNDS), Vol. 8, Nos. ½, 2012, Pages:70-84
[23] Schuett, Maria and Rahman, Syed (Shawon); “Information Security Synthesis in Online
Universities”; International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.5,
Sep 2011
[24] Slaughter, Jason and Rahman, Syed (Shawon); " Information Security Plan for Flight Simulator
Applications"; International Journal of Computer Science & Information Technology (IJCSIT), Vol.
3, No 3, June 2011
[25] Bisong, Anthony and Rahman, Syed (Shawon); "An Overview of the Security Concerns in Enterprise
Cloud Computing "; International Journal of Network Security & Its Applications (IJNSA), Vol.3,
No.1, January 2011
[26] Hossain, Md; Hossain, Nazmul; Shahid, Afridi and Rahman, Shawon; “Security Solution of RFID
Card Through Cryptography”; The Third International Symposium on Dependability in Sensor,
Cloud, and Big Data Systems and Applications (DependSys 2017), Guangzhou, China, December 12-
15, 2017
[27] Okonofua, Henry and Rahman, Shawon; “Evaluating the Risk Management Plan and Addressing
Factors for Successes in Government Agencies”; 17th IEEE International Conference On Trust,
Security And Privacy In Computing And Communications (IEEE TrustCom-18), August 1-3, 2018,
New York, USA
AUTHORS’ SHORT BIO
Michael Adekanye is a Ph.D. student at the Capella University in Information TechnologySpecialization:
Info Assurance and Security Program.His research interests include the effectof Cybersecurity on
Infrastructures vulnerabilities threat against systems collusion and how to mitigation robust password
authentication on all systems.
Dr. Shawon S. M. Rahman is an Associate Professor of Computer Science at the
University of Hawaii-Hilo and a part-time faculty of Information Technology,
Information Assurance and Security Program at the Capella University. Dr.
Rahman’s research interests include software engineering education, information
assurance and security, digital forensics, web accessibility, cloud-computing, and
software testing and quality assurance. He has published over 110 peer-reviewed
articles in various international journals, conferences, and books. He is an active
member of many professional organizations including IEEE, ACM, ASEE, ASQ,
and UPE.

Contenu connexe

Tendances

CROs must be part of the cybersecurity solution by david x martin
CROs must be part of the cybersecurity solution by david x martinCROs must be part of the cybersecurity solution by david x martin
CROs must be part of the cybersecurity solution by david x martinDavid X Martin
 
MCGlobalTech Commercial Cybersecurity Capability Statement
MCGlobalTech Commercial Cybersecurity Capability StatementMCGlobalTech Commercial Cybersecurity Capability Statement
MCGlobalTech Commercial Cybersecurity Capability StatementWilliam McBorrough
 
10 ways to ensure your safety leadership journey towards vision zero
10 ways to ensure your safety leadership journey towards vision zero10 ways to ensure your safety leadership journey towards vision zero
10 ways to ensure your safety leadership journey towards vision zeroConsultivo
 
Data security: How a proactive C-suite can reduce cyber-risk for the enterprise
Data security: How a proactive C-suite can reduce cyber-risk for the enterpriseData security: How a proactive C-suite can reduce cyber-risk for the enterprise
Data security: How a proactive C-suite can reduce cyber-risk for the enterpriseThe Economist Media Businesses
 
The security risk management guide
The security risk management guideThe security risk management guide
The security risk management guideSergey Erohin
 
The Cyber Security Leap: From Laggard to Leader
The Cyber Security Leap: From Laggard to LeaderThe Cyber Security Leap: From Laggard to Leader
The Cyber Security Leap: From Laggard to LeaderAccenture Insurance
 
Accenture Security Report 2016 Infographic for Insurance
Accenture Security Report 2016 Infographic for InsuranceAccenture Security Report 2016 Infographic for Insurance
Accenture Security Report 2016 Infographic for InsuranceAccenture Insurance
 
POV - Enterprise Security Canvas
POV - Enterprise Security CanvasPOV - Enterprise Security Canvas
POV - Enterprise Security CanvasRobert Greiner
 
An Intro to Resolver's Incident Management Application
An Intro to Resolver's Incident Management ApplicationAn Intro to Resolver's Incident Management Application
An Intro to Resolver's Incident Management ApplicationResolver Inc.
 
Massbiz Consulting Crede Sed Proba
Massbiz Consulting Crede Sed ProbaMassbiz Consulting Crede Sed Proba
Massbiz Consulting Crede Sed ProbaJames McDonald
 
Selling security to the C-level
Selling security to the C-levelSelling security to the C-level
Selling security to the C-levelDonald Tabone
 
Climate change-risk-management-guidance-report
Climate change-risk-management-guidance-reportClimate change-risk-management-guidance-report
Climate change-risk-management-guidance-reportIRM India Affiliate
 
Risksense: 7 Experts on Threat and Vulnerability Management
Risksense: 7 Experts on Threat and Vulnerability ManagementRisksense: 7 Experts on Threat and Vulnerability Management
Risksense: 7 Experts on Threat and Vulnerability ManagementMighty Guides, Inc.
 
Ast 0079872 1505924-esg_wp_rsa_big_data_and_security_analytics_jan_2013
Ast 0079872 1505924-esg_wp_rsa_big_data_and_security_analytics_jan_2013Ast 0079872 1505924-esg_wp_rsa_big_data_and_security_analytics_jan_2013
Ast 0079872 1505924-esg_wp_rsa_big_data_and_security_analytics_jan_2013drewz lin
 
Int:rsect: CEO Address with Will Anderson
Int:rsect: CEO Address with Will AndersonInt:rsect: CEO Address with Will Anderson
Int:rsect: CEO Address with Will AndersonResolver Inc.
 

Tendances (17)

Awareness is only the first step
Awareness is only the first stepAwareness is only the first step
Awareness is only the first step
 
CROs must be part of the cybersecurity solution by david x martin
CROs must be part of the cybersecurity solution by david x martinCROs must be part of the cybersecurity solution by david x martin
CROs must be part of the cybersecurity solution by david x martin
 
MCGlobalTech Commercial Cybersecurity Capability Statement
MCGlobalTech Commercial Cybersecurity Capability StatementMCGlobalTech Commercial Cybersecurity Capability Statement
MCGlobalTech Commercial Cybersecurity Capability Statement
 
Finding a strategic voice
Finding a strategic voiceFinding a strategic voice
Finding a strategic voice
 
10 ways to ensure your safety leadership journey towards vision zero
10 ways to ensure your safety leadership journey towards vision zero10 ways to ensure your safety leadership journey towards vision zero
10 ways to ensure your safety leadership journey towards vision zero
 
Data security: How a proactive C-suite can reduce cyber-risk for the enterprise
Data security: How a proactive C-suite can reduce cyber-risk for the enterpriseData security: How a proactive C-suite can reduce cyber-risk for the enterprise
Data security: How a proactive C-suite can reduce cyber-risk for the enterprise
 
The security risk management guide
The security risk management guideThe security risk management guide
The security risk management guide
 
The Cyber Security Leap: From Laggard to Leader
The Cyber Security Leap: From Laggard to LeaderThe Cyber Security Leap: From Laggard to Leader
The Cyber Security Leap: From Laggard to Leader
 
Accenture Security Report 2016 Infographic for Insurance
Accenture Security Report 2016 Infographic for InsuranceAccenture Security Report 2016 Infographic for Insurance
Accenture Security Report 2016 Infographic for Insurance
 
POV - Enterprise Security Canvas
POV - Enterprise Security CanvasPOV - Enterprise Security Canvas
POV - Enterprise Security Canvas
 
An Intro to Resolver's Incident Management Application
An Intro to Resolver's Incident Management ApplicationAn Intro to Resolver's Incident Management Application
An Intro to Resolver's Incident Management Application
 
Massbiz Consulting Crede Sed Proba
Massbiz Consulting Crede Sed ProbaMassbiz Consulting Crede Sed Proba
Massbiz Consulting Crede Sed Proba
 
Selling security to the C-level
Selling security to the C-levelSelling security to the C-level
Selling security to the C-level
 
Climate change-risk-management-guidance-report
Climate change-risk-management-guidance-reportClimate change-risk-management-guidance-report
Climate change-risk-management-guidance-report
 
Risksense: 7 Experts on Threat and Vulnerability Management
Risksense: 7 Experts on Threat and Vulnerability ManagementRisksense: 7 Experts on Threat and Vulnerability Management
Risksense: 7 Experts on Threat and Vulnerability Management
 
Ast 0079872 1505924-esg_wp_rsa_big_data_and_security_analytics_jan_2013
Ast 0079872 1505924-esg_wp_rsa_big_data_and_security_analytics_jan_2013Ast 0079872 1505924-esg_wp_rsa_big_data_and_security_analytics_jan_2013
Ast 0079872 1505924-esg_wp_rsa_big_data_and_security_analytics_jan_2013
 
Int:rsect: CEO Address with Will Anderson
Int:rsect: CEO Address with Will AndersonInt:rsect: CEO Address with Will Anderson
Int:rsect: CEO Address with Will Anderson
 

Similaire à THE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENT

The security risk management guide
The security risk management guideThe security risk management guide
The security risk management guideSergey Erohin
 
Information Security Maturity Model
Information Security Maturity ModelInformation Security Maturity Model
Information Security Maturity ModelCSCJournals
 
Safety Management System1SMS-1Jeffrey D Carpenter, CSP.docx
Safety Management System1SMS-1Jeffrey D Carpenter, CSP.docxSafety Management System1SMS-1Jeffrey D Carpenter, CSP.docx
Safety Management System1SMS-1Jeffrey D Carpenter, CSP.docxrtodd599
 
Targeted Solutions BMS Profile
Targeted Solutions BMS ProfileTargeted Solutions BMS Profile
Targeted Solutions BMS ProfileLeon Geldenhuys
 
Five steps to achieve success with application security
Five steps to achieve success with application securityFive steps to achieve success with application security
Five steps to achieve success with application securityIBM Security
 
State of Security McAfee Study
State of Security McAfee StudyState of Security McAfee Study
State of Security McAfee StudyHiten Sethi
 
What-are-the-12-Elements-of-SMSystemspdf
What-are-the-12-Elements-of-SMSystemspdfWhat-are-the-12-Elements-of-SMSystemspdf
What-are-the-12-Elements-of-SMSystemspdfmansour dalgamouni
 
RISK MANAGEMENT: 4 ESSENTIAL FRAMEWORKS
RISK MANAGEMENT: 4 ESSENTIAL FRAMEWORKSRISK MANAGEMENT: 4 ESSENTIAL FRAMEWORKS
RISK MANAGEMENT: 4 ESSENTIAL FRAMEWORKSChristina33713
 
Using Security Metrics to Drive Action in Asia Pacific - 22 Experts Share How...
Using Security Metrics to Drive Action in Asia Pacific - 22 Experts Share How...Using Security Metrics to Drive Action in Asia Pacific - 22 Experts Share How...
Using Security Metrics to Drive Action in Asia Pacific - 22 Experts Share How...Mighty Guides, Inc.
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldnooralmousa
 
Security Governance by Risknavigator 2010
Security Governance by Risknavigator 2010Security Governance by Risknavigator 2010
Security Governance by Risknavigator 2010Lennart Bredberg
 
Enterprise risk management
Enterprise risk managementEnterprise risk management
Enterprise risk managementAnu Damodaran
 
Ferma perspectives #2 - Cyber Risk Governance 09.10.2018
Ferma perspectives #2 - Cyber Risk Governance 09.10.2018Ferma perspectives #2 - Cyber Risk Governance 09.10.2018
Ferma perspectives #2 - Cyber Risk Governance 09.10.2018FERMA
 
A Practical Approach to Managing Information System Risk
A Practical Approach to Managing Information System RiskA Practical Approach to Managing Information System Risk
A Practical Approach to Managing Information System Riskamiable_indian
 
Running head RISK MANAGEMENT AND INSURANCERISK MANAGEMENT AND .docx
Running head RISK MANAGEMENT AND INSURANCERISK MANAGEMENT AND .docxRunning head RISK MANAGEMENT AND INSURANCERISK MANAGEMENT AND .docx
Running head RISK MANAGEMENT AND INSURANCERISK MANAGEMENT AND .docxtoltonkendal
 
Enterprise Risk Management
Enterprise Risk ManagementEnterprise Risk Management
Enterprise Risk ManagementAnu Damodaran
 
Management of risk introduction
Management of risk introductionManagement of risk introduction
Management of risk introductionSpyros Ktenas
 

Similaire à THE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENT (20)

The security risk management guide
The security risk management guideThe security risk management guide
The security risk management guide
 
Control Risks-ERM-whitepaper
Control Risks-ERM-whitepaperControl Risks-ERM-whitepaper
Control Risks-ERM-whitepaper
 
Information Security Maturity Model
Information Security Maturity ModelInformation Security Maturity Model
Information Security Maturity Model
 
Safety Management System1SMS-1Jeffrey D Carpenter, CSP.docx
Safety Management System1SMS-1Jeffrey D Carpenter, CSP.docxSafety Management System1SMS-1Jeffrey D Carpenter, CSP.docx
Safety Management System1SMS-1Jeffrey D Carpenter, CSP.docx
 
Targeted Solutions BMS Profile
Targeted Solutions BMS ProfileTargeted Solutions BMS Profile
Targeted Solutions BMS Profile
 
Five steps to achieve success with application security
Five steps to achieve success with application securityFive steps to achieve success with application security
Five steps to achieve success with application security
 
State of Security McAfee Study
State of Security McAfee StudyState of Security McAfee Study
State of Security McAfee Study
 
What-are-the-12-Elements-of-SMSystemspdf
What-are-the-12-Elements-of-SMSystemspdfWhat-are-the-12-Elements-of-SMSystemspdf
What-are-the-12-Elements-of-SMSystemspdf
 
Essay On Risk Management
Essay On Risk ManagementEssay On Risk Management
Essay On Risk Management
 
Risk Management Essay
Risk Management EssayRisk Management Essay
Risk Management Essay
 
RISK MANAGEMENT: 4 ESSENTIAL FRAMEWORKS
RISK MANAGEMENT: 4 ESSENTIAL FRAMEWORKSRISK MANAGEMENT: 4 ESSENTIAL FRAMEWORKS
RISK MANAGEMENT: 4 ESSENTIAL FRAMEWORKS
 
Using Security Metrics to Drive Action in Asia Pacific - 22 Experts Share How...
Using Security Metrics to Drive Action in Asia Pacific - 22 Experts Share How...Using Security Metrics to Drive Action in Asia Pacific - 22 Experts Share How...
Using Security Metrics to Drive Action in Asia Pacific - 22 Experts Share How...
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless world
 
Security Governance by Risknavigator 2010
Security Governance by Risknavigator 2010Security Governance by Risknavigator 2010
Security Governance by Risknavigator 2010
 
Enterprise risk management
Enterprise risk managementEnterprise risk management
Enterprise risk management
 
Ferma perspectives #2 - Cyber Risk Governance 09.10.2018
Ferma perspectives #2 - Cyber Risk Governance 09.10.2018Ferma perspectives #2 - Cyber Risk Governance 09.10.2018
Ferma perspectives #2 - Cyber Risk Governance 09.10.2018
 
A Practical Approach to Managing Information System Risk
A Practical Approach to Managing Information System RiskA Practical Approach to Managing Information System Risk
A Practical Approach to Managing Information System Risk
 
Running head RISK MANAGEMENT AND INSURANCERISK MANAGEMENT AND .docx
Running head RISK MANAGEMENT AND INSURANCERISK MANAGEMENT AND .docxRunning head RISK MANAGEMENT AND INSURANCERISK MANAGEMENT AND .docx
Running head RISK MANAGEMENT AND INSURANCERISK MANAGEMENT AND .docx
 
Enterprise Risk Management
Enterprise Risk ManagementEnterprise Risk Management
Enterprise Risk Management
 
Management of risk introduction
Management of risk introductionManagement of risk introduction
Management of risk introduction
 

Dernier

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 

Dernier (20)

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 

THE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENT

  • 1. International Journal of Network Security & Its Applications (IJNSA) Vol. 10, No.5, September 2018 DOI: 10.5121/ijnsa.2018.10502 13 THE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENT Michael O. Adekanye1 and Shawon S. M. Rahman, Ph.D.2 1 Address: P.O Box 9201, Trenton NJ 08650, USA 2 Associate Professor, Dept. of Computer Science & Engineering, University of Hawaii- Hilo, 200 W. Kawili Street, Hilo, HI 96720, USA, ABSTRACT The philosophy of Enterprise Security Risk Management (ESRM) drives a risk-based approach to managing any security risks, physical or logical and holistically applies to every security process. There are globally established risk principles that are common among any developed risk management standard. This model associates the relationship of risk principles to the practice of managing security risks. The ESRM processes, when successfully and consistently adapted to a security program, will define what a progressive security program looks like, drive strategic through initiatives, build the business understanding of security’s role to develop a budgeting strategy, and initiate board-level, risk-based reporting. The management security leader's role in ESRM is to manage risks and unthinkable harm to enterprise assets and stockholder in partnership with the business leaders whose assets are exposed to those risks management. ESRM is part of educating business leaders on the realistic of impacts. These identified risks, presenting any potential strategies to mitigate those impacts, and enacting the option chosen by the business in line with acceptable levels of business risk tolerance. The present data should be used to showcase how our service helps identify, evaluate, and mitigate risks at face value that would be detrimental to a company’s long-term prosperity. We need to show how using our security risk management will ultimately benefit the company's work by improving policies and procedures and reducing other expenses through the use of risk principles management. KEYWORDS Enterprises Security Risk Management, ESRM, Maturation of a Profession, Unfettered Rules, Risk Mitigation, Risk Mechanism, Enterprise Risk Management, Risk Principles Management, Manage Security Programs, 1. INTRODUCTION The Enterprise Security Risk Management (ESRM) is a new philosophy and methodology for managing security programs through the use of traditional risk principles. As a philosophy and life cycle, ESRM is focused on creating a business partnership between security practitioners and business leaders to more effectively to protect against security risks. The acceptable business tolerances as defined by business owners and stakeholders. This paper explores the basics gap between the ESRM philosophy and life cycle and also shows how embracing the ESRM philosophy and implementation works. As a security professional, have we noticed that our other company do not always define security in the same way? Perhaps security interests and business interests have become misaligned. Based on the new approach from the author Arena[2]. The ESRM has the potential to transform the practice of any security completely. ESRM is based on an extended method of managing an effective security program through the use of risk principles management by companies around the world. The present principle of ESRM principles can change the way we perform our jobs, the
  • 2. International Journal of Network Security & Its Applications (IJNSA) Vol. 10, No.5, September 2018 14 way we see our roles and the way others see them from another perspective. The ways we protect our enterprises, our assets, and our employees. And ESRM helps us in our careers, by increasing our personal and professional satisfaction and by ensuring that security is seen as it deserves to be as a professional discipline. ESRM can help the organization and our security program to be successful[3]. Whether the threats are informational, cyber, physical security, asset management, or business continuity, all were included in the holistic, all-encompassing ESRM approach which will move our task-based to risk-based security. As professional security, we may already practice some of the components of ESRM. Many of the concepts such as risk identification, risk transfer and acceptance, crisis management, and incident response will be well known to us[3]. Many organizations with a comprehensive, holistic way that ESRM represents and even fewer that communicate these principles effectively to key decision-makers. ESRM offers very skills and straightforward, realistic, and actionable approach dealing effectively with all the distinct types of security risks facing individual as a security practitioner in the organization[15]. The ESRM is implemented in a life cycle of risk management including the Asset assessment and prioritization, risk assessment and prioritization, Risk treatment mitigation and continuous improvement. Throughout the ESRM[7] concepts and applications, the authors release the tools give the company the materials that will help an employee to advance individual in the security field, no matter what the situation; if we are a student, a newcomer, or a seasoned professional. The realistic case studies with questions to help an individual to assess security program, through- provoking discussion and questions, useful figures and tables as references for the article[7] Redefining how security enterprises work, everyone thinks about the role of security in the enterprise security risk area; the security organization can focus on working in partnership with business leaders and CIO, including the stakeholders to identify and mitigate the use of security risk. As we begin to use ESRM incorporation; we will experience greater personal and professional satisfaction as a security professional, and we will become a recognized and trusted partner in the business critical effort of protecting our enterprise and all its assets. 2. THE MATURATION OF A PROFESSION As the supporter of ESRM grew in number and further create a more significant career, implementing the ideas in our various organizations, the core idea of ESRM continued to grow and mature. Security practitioners started teaching ESRM educational sessions, as well as writing white papers, articles, and case studies. They spoke about the driving philosophy of ESRM, and most importantly, communicated the success stories of implementation and ongoing management of many companies bringing more converts into the fold [3]. The collective lessons learned from ESRM adopters, in turn, drove many of us to realign and optimize our departments and individual functions to be more consultative and tightly tied to our respective business's strategy, providing more and more real-world success metrics for the ESRM. 2.1. PURSUE CONTINUOUS IMPROVEMENT Enterprise security risk management effort starts as a discrete project but requires ongoing consideration [9]. Those charged with security must keep current with threats and trends within the organization and beyond. Security incidents [18][22]need the proper cause of analysis this should include team members beyond those directly charged with security. Incidents represent apparent opportunities to reassess risks and responses, and threat analysis and response plans should regularly be reviewed, regardless of whether an event has ESRM Principles and policies in Place.
  • 3. International Journal of Network Security & Its Applications (IJNSA) Vol. 10, No.5, September 2018 Figure 1: Pursue Continuous Improvement occurred 2.2. UNFETTEREDRULES,BRING BYOD can be a cost-effective way to allow users to use tools they're more comfortable and familiar with [4] policies and technical controls to manage those are critical. Left unchecked, they can result in the loss of sensitive data, such as source code or corporations think there were immune to hacking or device destruction by a virus, so they forget to close the back door, leaving backup devices unsecured on filing cabinets or in cubicles, and the lack of screensaver passwords to s endpoint security and passive scans suffice every site vulnerable to cross-site request forgeries, XSS cross Strong sites required require robust security such as the Open Web Application Security Project (OWASP) technology[17]. OWASP is a unique software company that positions herself to provide impartial, information about AppSec to individuals, and corporations, univ government agencies and departments’ organizations around the world. The company Operated in a community of like-minded professionals, OWASP issues software tools and knowledge based documentation on application security monitoring for threats and understanding new risks. 2.3. THE NECESSARY SKILL S The ESRM leader used a wide range of skill sets to be to be successful. According to the author[1], these skills are less related to security knowledge Leading the enterprise's security risk management effort is about being supportive to the business objectives and the board’s goals, and aligning the company with those and pushing the program as part of the board’s overall business aims and objectives innovative business, we do not have to be a Chief Financial Officer (CFO) or developer or retailer; what we have to be is a very good generalist and a good leader, somebody who can make decisions and get people on highly innovative on different functions in the organizations to engaged in trust[5]. What we are able to provide is the change in management innovation and the use of an appropriate approach to solve problems. The implementation of a program involves change, and if we have got a skill set that includes an understanding of business processes and understanding the business, as we would if we were a consultant coming in to examine process flows and working relationships, that skill a risk management program[5] [23] people in finance we can call on for that skill set. We have worked closely with IT and IT International Journal of Network Security & Its Applications (IJNSA) Vol. 10, No.5, September 2018 Figure 1: Pursue Continuous Improvement occurred RING YOUR OWN DEVICE(BYOD) effective way to allow users to use tools they're more comfortable and policies and technical controls to manage those are critical. Left unchecked, they can result in the loss of sensitive data, such as source code or client information. Many corporations think there were immune to hacking or device destruction by a virus, so they forget to close the back door, leaving backup devices unsecured on filing cabinets or in cubicles, and the lack of screensaver passwords to secure laptops and desktops when unattended. Assuming that endpoint security and passive scans suffice[4]. The prevalence of web applications makes almost site request forgeries, XSS cross-site scripting[18] sites required require robust security such as the Open Web Application Security Project . OWASP is a unique software company that positions herself to provide impartial, information about AppSec to individuals, and corporations, univ government agencies and departments’ organizations around the world. The company Operated minded professionals, OWASP issues software tools and knowledge based documentation on application security[24] [25]. Networks must be proactive, continually monitoring for threats and understanding new risks. SETS The ESRM leader used a wide range of skill sets to be to be successful. According to the , these skills are less related to security knowledge than they are in the business world. Leading the enterprise's security risk management effort is about being supportive to the business objectives and the board’s goals, and aligning the company with those and pushing the program erall business aims and objectives[1]. To understand the pure and innovative business, we do not have to be a Chief Financial Officer (CFO) or developer or retailer; what we have to be is a very good generalist and a good leader, somebody who can make sions and get people on highly innovative on different functions in the organizations to . What we are able to provide is the change in management innovation and the approach to solve problems. of a program involves change, and if we have got a skill set that includes an understanding of business processes and understanding the business, as we would if we were a consultant coming in to examine process flows and working relationships, that skill set helps with [5] [23]. Just as significant know who to go to for help; we have people in finance we can call on for that skill set. We have worked closely with IT and IT International Journal of Network Security & Its Applications (IJNSA) Vol. 10, No.5, September 2018 15 effective way to allow users to use tools they're more comfortable and policies and technical controls to manage those are critical. Left unchecked, they client information. Many corporations think there were immune to hacking or device destruction by a virus, so they forget to close the back door, leaving backup devices unsecured on filing cabinets or in cubicles, and the ecure laptops and desktops when unattended. Assuming that . The prevalence of web applications makes almost [18], and more. sites required require robust security such as the Open Web Application Security Project . OWASP is a unique software company that positions herself to provide impartial, information about AppSec to individuals, and corporations, universities, government agencies and departments’ organizations around the world. The company Operated minded professionals, OWASP issues software tools and knowledge- be proactive, continually The ESRM leader used a wide range of skill sets to be to be successful. According to the than they are in the business world. Leading the enterprise's security risk management effort is about being supportive to the business objectives and the board’s goals, and aligning the company with those and pushing the program . To understand the pure and innovative business, we do not have to be a Chief Financial Officer (CFO) or developer or retailer; what we have to be is a very good generalist and a good leader, somebody who can make sions and get people on highly innovative on different functions in the organizations to . What we are able to provide is the change in management innovation and the of a program involves change, and if we have got a skill set that includes an understanding of business processes and understanding the business, as we would if we were a set helps with . Just as significant know who to go to for help; we have people in finance we can call on for that skill set. We have worked closely with IT and IT
  • 4. International Journal of Network Security & Its Applications (IJNSA) Vol. 10, No.5, September 2018 16 development, so if we have any knowledge gap regarding skill sets with IT infrastructure and technical details. We have got people within the organization that we work with; whom we can call on[14]. What’s most important is a broader understanding of what is driving and therefore what can influence the business beyond security and malicious threat [27]concerns that we have every day. 2.4. COMMUNICATION SKILLS It’s really about personal ability to communicate, understand how others interact. We are not sure that’s it is something that it has to be learned, but we think an individual can develop it. The first skill is to be able to get past the initial mistrust. It’s fostering those relationships and letting those people know it’s not us coming in and taking our headcount, but the ability to articulate that this process is for the betterment of the organization[2] [16]. It is not about building our Corporation or convergence in the sense that we’re going to put two, three departments together it’s the ability to communicate through and come up with that soft approach and ability to talk business in the right sense. The skills that help the CSO and CIO communicate the skills throughout the organization. 2.5. THE BENEFIT OF TECHNOLOGIES ON INFORMATION SECURITY The technological progress brings clear benefits for the companies and the development of the profession[12], helping to reduce the costs by increasing the productivity level and enhancing process automation. However, we must be aware that each of these new technologies has a common challenge, the security of sensitive data. In the paper, we analyze the data security from the perspective of these existing and emerging technologies that influence the accounting field, along with the exposure of the possible impact of security incidents[13]. The international accounting bodies emphasize the necessity to develop the appropriate skills for protecting the data and assuring confidentiality, integrity, and availability of the information by using efficient controls[1]. By adopting these technologies in the accounting field, the risk of sensitive data exposure increases and this regard the practitioners need to understand the necessity of preventing security incidents, even more, now as the most significant amount of vulnerable data is produced by the accounting and financial departments[26]. 2.6. FRAMEWORK APPROACH IMPROVEMENT The organization’s ability to manage risk effectively is to depend on its intentions and its capacity to achieve those intentions to the highest[7]. The purpose and role are referred to as its risk management framework and is part of its system of governance and management. The quality of the structure is important because effective risk management that requires: a) clear expectations from the top; b) appropriate capability skills, resources, support c) sound relationships with d) stakeholders e) integration is known of necessary risk management practices into the day to day activities and accountabilities of the management team f) a firm commitment to continually learn and improve the risk management framework should not attempt to replace the natural capability of people to manage risk; instead, it should enhance an actual good practice among those who have reliable and comprehensive ideas consistent in dealing with issues For this to occur and for the required capability to be achieved, the organization requires, such as
  • 5. International Journal of Network Security & Its Applications (IJNSA) Vol. 10, No.5, September 2018 a) A set of suitable tools b) A smart and coherent approach to training and communication process tools competently and consistently and c) A model approach that signals and reinforces the correct The typical elements of a framework and an illustration of how this supports the integration and skill of the risk management process are shown in the table below. 2.7. THE IMPACT OF EDUCATING The ESRM is a management process used to effectively manage security risks, both proactively and reactively, across an enterprise setting. ESRM security-related risks to an organization and within the enterprise’s comp The management process quantifies threats, establishes mitigation plans, identifies risk acceptance practices, manages incidents, and guides risk owners in developing remediation efforts. ESRM involves in educating business leader presenting potential strategies to mitigate those impacts, and then enacting the option chosen by the business in line with acceptable levels of risk business with tolerance discussion into the appropriate context, we want to explain my journey through the security profession and share why we have been so focused on moving away from the old break glass when needed approach that so often characterizes my interactions with the non in my organization, and towards the ESRM approach. The ESRM is a security program management tool with direct mission and goals through management methods. Leader's role in ESRM is to manage security risks in the enterprise assets area. Those business leaders whose assets were exposed to the risks ought to have skills training in place to make a full impact to identified risks. The potential strategies to mitigate those impacts, and then enacting the option chosen by the business in line with acceptable levels of risk business with tolerance. To bring the discussion int appropriate context, we want to explain our journey through the security profession and share our thought on why we have been so focused on moving away. New thinking is needed to break away from an old approach that. Somehow characterizes as often in International Journal of Network Security & Its Applications (IJNSA) Vol. 10, No.5, September 2018 A smart and coherent approach to training and communication process tools competently A model approach that signals and reinforces the correct behavior and way of thinking. The typical elements of a framework and an illustration of how this supports the integration and skill of the risk management process are shown in the table below. DUCATING BUSINESS LEADERS ON SECURITY STRATEGY is a management process used to effectively manage security risks, both proactively and reactively, across an enterprise setting. ESRM [2] continuously assesses the full scope of related risks to an organization and within the enterprise’s complete portfolio of assets. The management process quantifies threats, establishes mitigation plans, identifies risk acceptance practices, manages incidents, and guides risk owners in developing remediation efforts. ESRM involves in educating business leaders on the realistic impacts of identified risks, presenting potential strategies to mitigate those impacts, and then enacting the option chosen by the business in line with acceptable levels of risk business with tolerance[12]. To bring the the appropriate context, we want to explain my journey through the security profession and share why we have been so focused on moving away from the old break glass when needed approach that so often characterizes my interactions with the non-security func in my organization, and towards the ESRM approach. Figure 2 - The ESRM Life Cycle The ESRM is a security program management tool with detail links and activities to an enterprise direct mission and goals through management methods. Leader's role in ESRM is to manage security risks in the enterprise assets area. Those business leaders whose assets were exposed to training in place to make a full impact to identified risks. The potential strategies to mitigate those impacts, and then enacting the option chosen by the business in line with acceptable levels of risk business with tolerance. To bring the discussion int appropriate context, we want to explain our journey through the security profession and share our thought on why we have been so focused on moving away. New thinking is needed to break away from an old approach that. Somehow characterizes as often interactions with the non International Journal of Network Security & Its Applications (IJNSA) Vol. 10, No.5, September 2018 17 A smart and coherent approach to training and communication process tools competently d way of thinking. The typical elements of a framework and an illustration of how this supports the integration and TRATEGY is a management process used to effectively manage security risks, both proactively continuously assesses the full scope of lete portfolio of assets. The management process quantifies threats, establishes mitigation plans, identifies risk acceptance practices, manages incidents, and guides risk owners in developing remediation s on the realistic impacts of identified risks, presenting potential strategies to mitigate those impacts, and then enacting the option chosen by . To bring the the appropriate context, we want to explain my journey through the security profession and share why we have been so focused on moving away from the old break glass security functions links and activities to an enterprise direct mission and goals through management methods. Leader's role in ESRM is to manage security risks in the enterprise assets area. Those business leaders whose assets were exposed to training in place to make a full impact to identified risks. The potential strategies to mitigate those impacts, and then enacting the option chosen by the business in line with acceptable levels of risk business with tolerance. To bring the discussion into the appropriate context, we want to explain our journey through the security profession and share our thought on why we have been so focused on moving away. New thinking is needed to break away teractions with the non-security
  • 6. International Journal of Network Security & Its Applications (IJNSA) Vol. 10, No.5, September 2018 18 functions in my organization and towards the ESRM approach. This approach is detailed in the ESRM Life Cycle Model The ESRM becomes an Australian Secret Intelligence Service (ASIS) strategic priority[14]. Today, every part of the business world is digitized and networked. A few years ago, an organization may have supported a single network of desktops within the confines of a physical office. No longer the case nowadays; data is accessed and manipulated from everywhere, not just through workstations and desktop. Computers in an office, with laptops at home, or even on cell phones and in airports, cafes, and other public places.E-commerce customers also submit credit card numbers via web forms without a second thought[7]. As the flexibility and robustness of digital devices continue to grow, security threats[19][20]are also becoming more sophisticated. Hackers deploy bots to enact DDoS (Distributed Denial of Service) attacks, and cause mayhem through pretesting, where they send an email under the guise of an authority figure or business to infect vulnerable systems with Trojans, viruses, or other malware. Additionally[1], the prevalence of Internet of Things (IoT) devices opens pathways to database disaster. Therefore, a new approach to security is necessary. Enterprise security management looks at policies and infrastructure from a holistic perspective and holds that all parts of an organization contribute to safety[8]. With this approach, new enterprise tools, such as SIEM security information and event management platforms, automate the monitoring and management of threats, software updates, reporting for compliance, and more. In this article, we have discussed enterprise security management and its derivatives, and explain common setbacks and difficulties in protecting our enterprise from security breaches[20]. Then, we have explored the best practices and how software tools can improve our security systems, and offer a heuristic for choosing the right solution for our organization. 3. HOW TO IMPLEMENT ENTERPRISE SECURITY RISK MANAGEMENT If enterprise security management provides the organizational structure and culture for enacting security plans, enterprise security risks management[19] is the process of identifying risks and eliminates the threats, determining how to mitigate them, and documenting policies and best practices to proactively and reactively address future occurrences[3]. The approach ESRM considers a project with its vision, mission, and goals. The concept is to protect the assets of an entire organization so that it can execute its larger business vision and mission. The purpose of continually identifies analyses, and responds to risks to the business. The goals create, maintain, and promote policies and best practices to protect the organization against security risks. To understand what’s at risk, one must know what assets and critical infrastructure and resources on have, and why they are essential[9]. Threat Modeling and Assessment and Risk Assessment very important. These were the reasonable and current security of the enterprise security risk management. Also, what do we consider our vulnerabilities and what are the risks to each asset? Who else might want to impede our business? Some significant dangers include the requirement for SSL and authorization checks and measures against SQL injection. 3.1 RISK MITIGATION ACTION POINTS Coordinate with the stakeholders to determine how to manage risks and identify security objectives. Options include stopping risky activities, planning mitigation for security events, or only accepting the risk. Creating a corporate security policy is essential, and must cover all aspects and assets of the organization. The enterprise security risk management (ESRM) is a progressive practice which, when combined with security convergence, these can help organizations such as my corporation to set up comprehensive SCRM processes. Aspects of
  • 7. International Journal of Network Security & Its Applications (IJNSA) Vol. 10, No.5, September 2018 19 enterprise security risk management can include Supply chain risk management; Physical asset protection; Human resource security; Information security[26]; Communications security and Continuity management. The Organizational behaviors that limit security; Not long ago, we experience computers with a powered-down modem, and an office with a locked front door would sufficiently protect our network and data information. But as the innovation progress, we no longer have access to the model. Instead, today’s security must be strategic, systematic, and repeatable. They followed ways and many organization sabotage their security; by inviting problem on their system. Figure 3: Risk Mitigation Action Points 3.2. THE FRAMEWORK FOR RISK MANAGEMENT After many years of strategic, tactical, practical experience in evaluating and enhancing structures for risk management in organizations[9], Broadleaf believes that immediate success depends as much on the manner in which any changes to a structure are developed and implemented as it does in the detail of the tools and written materials generated[9]. We strongly recommend to our clients that we helped through the management of change process, where key internal stakeholders are carefully involved and engaged in evaluating the existing approach and in planning how, where and when enhancements will be made. The core of this management of the change process involves internal stakeholder representatives participating in facilitated gap analysis and evaluation that leads to a bright and practical enhancement and implementation plan. To enable those stakeholder representatives to compete effectively, they need to be well informed on current risk management thinking and shown examples drawn from other organizations of elements of a risk management framework[3]. The approach has the added benefit that the participants of this process then become the organization’s Champions who were motivated to lead the implementation process in their departments and functions. They acted to convince their superiors of the merits of the approach and stimulate acceptance and use[6]. To be successful and efficient, management to change attitude requires: a) An accepted accurate representation of the current arrangements for managing differences between the forms of risks at present situation. b) Fundamental concepts of risk management at the desired goals regarding risk management and the framework process for the clearly understood by those sponsoring the change. c) A bright idea and accepted appreciation of the elements of the existing structure that need to be enhanced or improved and the nature of those changes and any additional features that need to be created what needs to change d) Exploration of options, constraints, enablers and critical paths leading to an appropriate plan of actions with timings
  • 8. International Journal of Network Security & Its Applications (IJNSA) Vol. 10, No.5, September 2018 e) A clear commitment to the program and its implementation through the allocation of suitable resources by senior management and by their continued oversight of progress Steps can be taken to separate the results from the senior management. Howe years and numerous attempts, we have found that most efficient approach, and the one that gains the highest degree of ownership and endorsement, is to involve representatives of senior internal stakeholders in all the steps over a short spa Figure 4: The framework for risk management 4. TECHNOLOGICAL INNOVATION Even though the benefits of the emerging technologies presented above are considered universally accepted, it is essential to understand the local impact of these technologies, regarding the accounting profession[6]. Another study concerning the willingness of accountants in rega to allowing cloud solutions has emphasized that the business shows a high level of interest in the benefits brought by cloud computing and consider that migration as representing a positive aspect[1]. However, we must not overlook that the usage of new existence of prepared professionals that will be able to exploit these resources efficiently. Based on the highlights the fact that the accounting profession has a significant role in the information technology and acceptance of information risk management[1] intermediary between the IT departments and the administration, by advising the suitable IT solutions that can add value to the organization, after performing appropriate analyses based on cost efficiency. The most significant benefits identified in this study are considered to be: a higher degree of innovation, rapidity and increased accuracy two critical drawbacks are addressed: the facts that most cloud providers do not offer a solution for local backup and the rigidity of cloud solution compared with desktop solutions. International Journal of Network Security & Its Applications (IJNSA) Vol. 10, No.5, September 2018 A clear commitment to the program and its implementation through the allocation of suitable resources by senior management and by their continued oversight of progress[13]. Steps can be taken to separate the results from the senior management. However, after many years and numerous attempts, we have found that most efficient approach, and the one that gains the highest degree of ownership and endorsement, is to involve representatives of senior internal stakeholders in all the steps over a short space of time. Figure 4: The framework for risk management NNOVATION DECISION MAKING of the emerging technologies presented above are considered universally accepted, it is essential to understand the local impact of these technologies, regarding . Another study concerning the willingness of accountants in rega to allowing cloud solutions has emphasized that the business shows a high level of interest in the benefits brought by cloud computing and consider that migration as representing a positive . However, we must not overlook that the usage of new technologies requires the existence of prepared professionals that will be able to exploit these resources efficiently. Based on the highlights the fact that the accounting profession has a significant role in the information technology and acceptance of emerging technologies, such as cloud accounting and [1]. The author considers that the accountants should act as an intermediary between the IT departments and the administration, by advising the suitable IT dd value to the organization, after performing appropriate analyses based on cost efficiency. The most significant benefits identified in this study are considered to be: a higher degree of innovation, rapidity and increased accuracy[7]. By analyzing the challenges presented, two critical drawbacks are addressed: the facts that most cloud providers do not offer a solution for local backup and the rigidity of cloud solution compared with desktop solutions. International Journal of Network Security & Its Applications (IJNSA) Vol. 10, No.5, September 2018 20 A clear commitment to the program and its implementation through the allocation of suitable resources by senior management and by their continued ver, after many years and numerous attempts, we have found that most efficient approach, and the one that gains the highest degree of ownership and endorsement, is to involve representatives of senior internal of the emerging technologies presented above are considered universally accepted, it is essential to understand the local impact of these technologies, regarding . Another study concerning the willingness of accountants in regards to allowing cloud solutions has emphasized that the business shows a high level of interest in the benefits brought by cloud computing and consider that migration as representing a positive technologies requires the existence of prepared professionals that will be able to exploit these resources efficiently. Based on the highlights the fact that the accounting profession has a significant role in the emerging technologies, such as cloud accounting and . The author considers that the accountants should act as an intermediary between the IT departments and the administration, by advising the suitable IT dd value to the organization, after performing appropriate analyses based on cost efficiency. The most significant benefits identified in this study are considered to be: a higher hallenges presented, two critical drawbacks are addressed: the facts that most cloud providers do not offer a solution
  • 9. International Journal of Network Security & Its Applications (IJNSA) Vol. 10, No.5, September 2018 Due to the dependency of IT enhancements that can f organizations, the security aspects of information risk management seem to be the biggest drawback identified by the researchers in the Asia accounting profession. Accounting practitioners rely heavily on the security The IT professionals with the overall safety of the applications and the existence of a disaster recovery plan are considered to be a key differentiator management and multi-tenancy issues are deemed to be a significant drawback for the accounting professionals[10]. This outcome shows that there are differences in emerging information risk management expectations between the financial and IT departments selection of the cloud supplier, an aspect that can influence the overall security solution, in the scenario in which the accounting department should mitigate any possible migration. Mobile technologies are being adopted m emerging technologies presented, a point that can be explained through the general preference of using Smartphones and tablets[4] reduced costs, when are used with cloud platforms differentiator in the current local economic context. However, some of the most addressed drawbacks and challenges of this technology are limited resources, small screens connectivity issues. The general trend of adopting the BYOD (Bring Your Own Device) concept comes with a broad range of security issues that must be addressed, such as physical security of the device, software vulnerabilities, and access control. Figure 5: Technological Innovation Decision Making 5. CONCLUSION The Enterprise's Security Risk Management (ESRM) is a security program management risk with a detailed approach that links activities to an enterprise's mission. The business goals management methodology[15] [21] enterprise management partnership assets to business leadership. The ESRM which involves in educational business leadershipon the realistic of impacts. To identify risks with potential strategies to mitigate those impacts, and then enacting the option of chosen by the business in line with acceptable levels of risk and resilience with the goal. The most significant, perhaps with the International Journal of Network Security & Its Applications (IJNSA) Vol. 10, No.5, September 2018 Due to the dependency of IT enhancements that can facilitate the operational processes of organizations, the security aspects of information risk management seem to be the biggest drawback identified by the researchers in the Asia accounting profession. Accounting practitioners rely heavily on the security of data in transit and certifications of the cloud supplier. The IT professionals with the overall safety of the applications and the existence of a disaster recovery plan are considered to be a key differentiator[7] Moreover, shared data information ris tenancy issues are deemed to be a significant drawback for the accounting . This outcome shows that there are differences in emerging information risk management expectations between the financial and IT departments when it comes to the selection of the cloud supplier, an aspect that can influence the overall security solution, in the scenario in which the accounting department should mitigate any possible Mobile technologies are being adopted more quickly and efficiently compared with the other emerging technologies presented, a point that can be explained through the general preference of [4] Benefits such as continuous access, better connectivity, and s, when are used with cloud platforms[4] qualifies mobile technologies as a critical differentiator in the current local economic context. However, some of the most addressed drawbacks and challenges of this technology are limited resources, small screens connectivity issues. The general trend of adopting the BYOD (Bring Your Own Device) concept comes with a broad range of security issues that must be addressed, such as physical security of the device, software vulnerabilities, Figure 5: Technological Innovation Decision Making The Enterprise's Security Risk Management (ESRM) is a security program management risk with a detailed approach that links activities to an enterprise's mission. The business goals [15] [21]. The security leadership role in ESRM to manage risks from enterprise management partnership assets to business leadership. The ESRM which involves in educational business leadershipon the realistic of impacts. To identify risks with potential to mitigate those impacts, and then enacting the option of chosen by the business in line with acceptable levels of risk and resilience with the goal. The most significant, perhaps with the International Journal of Network Security & Its Applications (IJNSA) Vol. 10, No.5, September 2018 21 acilitate the operational processes of organizations, the security aspects of information risk management seem to be the biggest drawback identified by the researchers in the Asia accounting profession. Accounting of data in transit and certifications of the cloud supplier. The IT professionals with the overall safety of the applications and the existence of a disaster Moreover, shared data information risk tenancy issues are deemed to be a significant drawback for the accounting . This outcome shows that there are differences in emerging information risk when it comes to the selection of the cloud supplier, an aspect that can influence the overall security[27] of the solution, in the scenario in which the accounting department should mitigate any possible ore quickly and efficiently compared with the other emerging technologies presented, a point that can be explained through the general preference of Benefits such as continuous access, better connectivity, and qualifies mobile technologies as a critical differentiator in the current local economic context. However, some of the most addressed drawbacks and challenges of this technology are limited resources, small screens, and connectivity issues. The general trend of adopting the BYOD (Bring Your Own Device) concept comes with a broad range of security issues that must be addressed, such as physical security of The Enterprise's Security Risk Management (ESRM) is a security program management risk with a detailed approach that links activities to an enterprise's mission. The business goals through risk . The security leadership role in ESRM to manage risks from enterprise management partnership assets to business leadership. The ESRM which involves in educational business leadershipon the realistic of impacts. To identify risks with potential to mitigate those impacts, and then enacting the option of chosen by the business in line with acceptable levels of risk and resilience with the goal. The most significant, perhaps with the
  • 10. International Journal of Network Security & Its Applications (IJNSA) Vol. 10, No.5, September 2018 22 awareness of enterprises security risks management. In the world of enterprise risk management, the business owners are the owners of all risks. Depending on the asset in question, the owner of that asset whether a data hall of information, a warehouse of human capital, or brand reputation in the organization which determines the treatment of any risk to that asset[2]. The security practitioner in an ESRM programme is required by his or her philosophy to ensure that business leaders understand the risks to their assets. The philosophy drives all parts of the business to recognize and proactively deal with threats in the management and security departments. This integration provides a stable platform for the continuous development of a holistically secure enterprise[11]. The analysis of the Risk Management Approach with the various architecture levels to demonstrate how organizations could gain from the integration of enterprise risk management. The core levels of the organization and focusare on their investments to ensure a clear mission of readiness. With correct cyber health by implementing countermeasures across IT’s enterprises. To ensure mission continuity as well as develop future state architectures in delivering improved information security[10]. REFERENCES [1] Al-Htaybat, K. & von Alberti-Alhtaybat, L. (2017) “Big Data and corporate reporting: impacts and paradoxes”, Accounting, Auditing & Accountability Journal, vol. 30, no.4: 850-873 [2] Arena, M., Arnaboldi, M., &Azzone, G. (2011). Is enterprise risk management real?.Journal of Risk Research, 14(7), 779-797. doi:10.1080/13669877.2011.571775 [3] Baxter, R., Bedard, J. C., Hoitash, R., &Yezegel, A. (2013). Enterprise Risk Management Program Quality: Determinants, Value Relevance, and the Financial Crisis. Contemporary Accounting Research, 30(4), 1264-1295. doi:10.1111/j.1911-3846.2012.01194.x [4] Bradley, J., Loucks, J., Macaulay, J., Medcalf, R. &Buckalew, L. (2012) „BYOD: A Global Perspective, Harnessing Employee-Led Innovation”, available online at http://www.cisco.com/c/dam/en_us/about/ac79/docs/re/BYODHorizons-Global.pdf (accessed March 15th 2017) [5] Caldarelli, A., Ferri, L. &Maffei, M. (2017) “Cloud Computing Adoption in Italian SMEs: A Focus on Decision-making and Post-implementation Processes”, Reshaping Accounting and Management Control Systems, 53-76 [6] Frigo, M. L., &Ubelhart, M. C. (2016). Human capital management: The central element of all risk. People and Strategy, 39(1), 42–46. [7] Gupta, S., & Saini, A. K. (2013). Information System Security and Risk Management: Issues and Impact on Organizations. Global Journal Of Enterprise Information System, 5(1), 31-35. [8] Huth, C. (2013). The insider threat and employee privacy: An overview of recent case law. Computer Law & Security Report, 29(4), 368–381. Retrieved from http://www.sciencedirect.com/science/article/pii/S0267364913001052?np=y [9] Hwankuk, K., Kyungho, L., &Jongin, L. (2017). A Study on the Impact Analysis of Security Flaws between Security Controls: An Empirical Analysis of K-ISMS using Case-Control Study. KSII Transactions On Internet & Information Systems, 11(9), 4588-4608. doi:10.3837/tiis.2017.09.022 [10] National Institute of Standards and Technology. (2010). Guide for Applying the Risk Management Framework to Federal Information Systems. Special Publication 800-37, Rev 1. (Gaithersburg, MD: National Institute of Standards and Technology.) [11] National Institute of Standards and Technology (NIST). (n.d.). Risk management framework overview. Retrieved from http://csrc.nist.gov/groups/SMA/fisma/framework.html [12] Petruzzi, J., &Loyear, R. (2016). Improving organisational resilience through enterprise security risk management. Journal Of Business Continuity & Emergency Planning, 10(1), 44-56. [13] Ray, Bonnie K; Tao, Shu; Olkhovets, Anatoli; Subramanian, Dharmashankar. EURO Journal on Decision Processes; Heidelberg Vol. 1, Iss. 3-4,(Nov 2013): 187-203. DOI:10.1007/s40070-013- 0013-6 npKey=5e7ab5151c75b3dbb6d5aa532fa90456ded4a947dcb7c3d74459ee872656c319 [14] Rimböck, A., &Loipersberger, A. (2013). Integral risk management: steps on the way from theory to practice. Natural Hazards, 67(3), 1075–1082. [15] Yaraghi, N., & Langhe, R. G. (2011). Critical success factors for risk management systems. Journal Of Risk Research, 14(5), 551-581. doi:10.1080/13669877.2010.547253
  • 11. International Journal of Network Security & Its Applications (IJNSA) Vol. 10, No.5, September 2018 23 [16] Loukaka, Alain and Rahman, Shawon; “Discovering New Cyber Protection Approaches From a Security Professional Prospective”; International Journal of Computer Networks & Communications (IJCNC) Vol.9, No.4, July 2017 [17] Al-Mamun, Abdullah, Rahman, Shawon and et al;“ Security Analysis of AES and Enhancing its Security by Modifying S-Box with an Additional Byte ”; International Journal of Computer Networks & Communications (IJCNC), Vol.9, No.2, March 2017 [18] Opala, Omondi John; Rahman, Shawon; and Alelaiwi, Abdulhameed; “The Influence of Information Security on the Adoption of Cloud computing: An Exploratory Analysis”, International Journal of Computer Networks & Communications (IJCNC), Vol.7, No.4, July 2015 [19] Rader, A., Marc and Rahman, Syed (Shawon); “Exploring Historical and Emerging Phishing Techniques and Mitigating the Associated Security Risks”; International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.4, July 2013 [20] Opala, John, Omondi and Rahman, Syed (Shawon);“Corporate Role in Protecting Consumers from the Risk of Identify theft ”; International Journal of Computer Networks & Communications (IJCNC), Vol.5, No.5, September 2013 [21] Neal, David and Rahman, Syed (Shawon); “Video Surveillance in the Cloud?”; The International Journal of Cryptography and Information Security (IJCIS), Vol.2, No.3, September 2012 [22] Halton, Michael and Rahman, Syed (Shawon); "The Top 10 Best Cloud-Security Practices in Next- Generation Networking"; International Journal of Communication Networks and Distributed Systems (IJCNDS), Vol. 8, Nos. ½, 2012, Pages:70-84 [23] Schuett, Maria and Rahman, Syed (Shawon); “Information Security Synthesis in Online Universities”; International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.5, Sep 2011 [24] Slaughter, Jason and Rahman, Syed (Shawon); " Information Security Plan for Flight Simulator Applications"; International Journal of Computer Science & Information Technology (IJCSIT), Vol. 3, No 3, June 2011 [25] Bisong, Anthony and Rahman, Syed (Shawon); "An Overview of the Security Concerns in Enterprise Cloud Computing "; International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.1, January 2011 [26] Hossain, Md; Hossain, Nazmul; Shahid, Afridi and Rahman, Shawon; “Security Solution of RFID Card Through Cryptography”; The Third International Symposium on Dependability in Sensor, Cloud, and Big Data Systems and Applications (DependSys 2017), Guangzhou, China, December 12- 15, 2017 [27] Okonofua, Henry and Rahman, Shawon; “Evaluating the Risk Management Plan and Addressing Factors for Successes in Government Agencies”; 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (IEEE TrustCom-18), August 1-3, 2018, New York, USA AUTHORS’ SHORT BIO Michael Adekanye is a Ph.D. student at the Capella University in Information TechnologySpecialization: Info Assurance and Security Program.His research interests include the effectof Cybersecurity on Infrastructures vulnerabilities threat against systems collusion and how to mitigation robust password authentication on all systems. Dr. Shawon S. M. Rahman is an Associate Professor of Computer Science at the University of Hawaii-Hilo and a part-time faculty of Information Technology, Information Assurance and Security Program at the Capella University. Dr. Rahman’s research interests include software engineering education, information assurance and security, digital forensics, web accessibility, cloud-computing, and software testing and quality assurance. He has published over 110 peer-reviewed articles in various international journals, conferences, and books. He is an active member of many professional organizations including IEEE, ACM, ASEE, ASQ, and UPE.