Please use this identifier to cite or link to this item: http://hdl.handle.net/1942/8087
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSCHREURS, Jeanne-
dc.contributor.authorMOREAU, Rachel-
dc.date.accessioned2008-04-01T13:06:32Z-
dc.date.available2008-04-01T13:06:32Z-
dc.date.issued2008-
dc.identifier.citationCarvalho Brito, A. & Feliz-Teixeira, M. (Ed.) Proceedings of the 15th European Concurrent Engineering Conference.. p. 63-68.-
dc.identifier.isbn978-9077381-39-7-
dc.identifier.urihttp://hdl.handle.net/1942/8087-
dc.description.abstractIt’s critical to know what are the critical resources and processes of the company and their weaknesses. Security has become a management problem. A security audit can offer a handy solution. We have developed a method and a system. The system is called BEVA. BEVA includes a security audit measuring the security situation of the organisation in 38 security factors. Based onthis audit, it delivers an overall security score and the one for each security factor. It also supports management in detecting the critical security factors in the company. The ICT security budget is not unlimited. As a result not all needed security technologies can be implemented to improve all critical SF’s. To create a priority list of the corresponding critical threats we need to refer to organisational risks. We calculate the company specific risk scores and by the way we identify the most critical threats and by the way the most effective security technologies that must be implemented-
dc.language.isoen-
dc.subject.otherICT security, risk management, audit checklist-
dc.titleICT security management and risk management-
dc.typeProceedings Paper-
local.bibliographicCitation.authorsCarvalho Brito, A.-
local.bibliographicCitation.authorsFeliz-Teixeira, M.-
local.bibliographicCitation.conferencedate9-11 April-
local.bibliographicCitation.conferencenameECEC 2008: The European Concurrent Engineering Conference-
local.bibliographicCitation.conferenceplacePorto, Portugal-
dc.identifier.epage68-
dc.identifier.spage63-
local.bibliographicCitation.jcatC1-
local.type.refereedRefereed-
local.type.specifiedProceedings Paper-
dc.bibliographicCitation.oldjcatC1-
dc.identifier.isi000255590500010-
local.bibliographicCitation.btitleProceedings of the 15th European Concurrent Engineering Conference.-
item.fulltextWith Fulltext-
item.accessRightsOpen Access-
item.contributorSCHREURS, Jeanne-
item.contributorMOREAU, Rachel-
item.fullcitationSCHREURS, Jeanne & MOREAU, Rachel (2008) ICT security management and risk management. In: Carvalho Brito, A. & Feliz-Teixeira, M. (Ed.) Proceedings of the 15th European Concurrent Engineering Conference.. p. 63-68..-
item.validationecoom 2009-
Appears in Collections:Research publications
Files in This Item:
File Description SizeFormat 
ECEC08.pdfPeer-reviewed author version808.86 kBAdobe PDFView/Open
Show simple item record

Page view(s)

12
checked on Sep 6, 2022

Download(s)

6
checked on Sep 6, 2022

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.