Skip to main content

Impact Assessment Through Collaborative Asset Modeling: The STORM-RM Approach

  • Conference paper
  • First Online:
Optimization Theory, Decision Making, and Operations Research Applications

Abstract

Existing Risk Management (RM) methodologies are mainly expert driven and require a large number of interviews with the security experts, which makes rather inefficient to take into account the knowledge from all the organization’s participants. In this paper we extend the STORM-RM multi-criteria group decision-making methodology. More specifically, we propose specific asset and user models, which make use of the AHP multi-criteria decision-making methodology in order to identify the organization’s assets and calculate their potential security impacts.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. AS/NZS 4360. Risk management standards australia, Strathfield (1999)

    Google Scholar 

  2. Austrian IT Security Handbook, Austrian federal chancellery (2004)

    Google Scholar 

  3. BSI-Standard 100-3. Risk analysis based on it-grundschutz (2005)

    Google Scholar 

  4. CRAMM. Ccta risk analysis and management method, cramm version 5.2 information security toolkit (2003)

    Google Scholar 

  5. Dutch A&K Analysis (1996)

    Google Scholar 

  6. Ebios. Expression des besoins et identification des objectifs de securite (2004)

    Google Scholar 

  7. ISO/IEC:15408-1. Information technology - security techniques - evaluation criteria for it security – part 1: Introduction and general model (2005)

    Google Scholar 

  8. ISO/IEC:27001. Information technology - security techniques - information security management systems - requirements (2005)

    Google Scholar 

  9. MAGERIT. Methodology for information systems risk analysis and management. Public Administration Ministry (2005)

    Google Scholar 

  10. Mehari. Méthode harmonisée d’ analyse de risque (2007)

    Google Scholar 

  11. Theodoros Ntouskas and Nineta Polemi. STORM-RM: A collaborative and multicriteria risk management methodology. To appear in Int. J. Multicriteria Decision Making.

    Google Scholar 

  12. OCTAVE. Octave method implementation guide version 2.0. Carnegie Mellon University, June (2001)

    Google Scholar 

  13. S-PORT. S-port project.

    Google Scholar 

  14. Saaty, T.L.: Decision making with the analytic hierarchy process. Int. J. Service Sci. 1, 83–98 (2008)

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgements

This work has been performed in the framework of the GSRT/SYNER-GASIA/ S-Port project (09SYN-72-650) (http://s-port.unipi.gr).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Theodoros Ntouskas .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Science+Business Media New York

About this paper

Cite this paper

Ntouskas, T., Kotzanikolaou, P., Polemi, N. (2013). Impact Assessment Through Collaborative Asset Modeling: The STORM-RM Approach. In: Migdalas, A., Sifaleras, A., Georgiadis, C., Papathanasiou, J., Stiakakis, E. (eds) Optimization Theory, Decision Making, and Operations Research Applications. Springer Proceedings in Mathematics & Statistics, vol 31. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-5134-1_21

Download citation

Publish with us

Policies and ethics