Document Server@UHasselt >
Research publications >
Please use this identifier to cite or link to this item:
|Title: ||ICT security management|
|Authors: ||SCHREURS, Jeanne|
|Issue Date: ||2007|
|Citation: ||Van Welden, D. (Ed.) 4th Future Business Technology Conference. p. 39-43.|
|Abstract: ||Security becomes more and more important and companies are aware that it has become a management problem. It’s critical to know what are the critical resources and processes of the company and their weaknesses. A security audit can be a handy solution. We have developed BEVA, a method to critically analyse the company and to uncover the weak spots in the security system. BEVA results also in a general security score and security scores for each security factor. These will be used in the risk analysis.
The goal is to increase the security score Ss to a postulated level by focusing on the critical security factors, those with a low security score.
We will identify the critical threats too, being those with a high risk or expected loss for the company if they occur.
In the next stage it will be resolved to implement some security measures to decrease the probabilities of the occurrence of the threats and as a consequence to decrease the risks and to improve the security situation.|
|Type: ||Proceedings Paper|
|Appears in Collections: ||Research publications|
Files in This Item:
|N/A||393.25 kB||Adobe PDF|
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.