Skip to main content

IT Risk and Security Management

  • Chapter
  • First Online:
The NICE Cyber Security Framework

Abstract

Risks in Information systems and technologies come from different dimensions in addition to security such as financial risks, managerial risks, people risks, etc. The cycle of risk and security management include 4 main stages: (1) Risks identifications, (2) Risk assessment and prioritizations, (3) Risk mitigations (e.g., prevention, tolerance, etc.), and finally (4) Risk monitoring to track all previous activities in future.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 16.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 99.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Campbell, G. (2013). Metrics for success: Aligning incident impact with “Acceptable” risk, what is your organization’s risk tolerance? Security info. Watch (www.securityinfowatch.com), June 14, 2013.

  2. Biba, K. J. (1977). Integrity considerations for secure computer systems, USAF Electronic Systems Division.

    Google Scholar 

  3. The Institute of Internal Auditors. (2016). guidance@theiia.org, Assessing cybersecurity risk roles of the three lines of defense.

    Google Scholar 

  4. Emtec Boot Camp Web Event, Crawl, walk, run, approach, IT service catalogue, May 2011.

    Google Scholar 

  5. Cherdantseva, Y., & Hilton, J. (2013). A reference model of information assurance & security. In 2013 Eighth International Conference on Paper Presented at the Availability, Reliability and Security (ares).

    Google Scholar 

  6. Stoneburner, G., Hayden, C., & Feringa, A. (2001). Engineering principles for information technology security (a baseline for achieving security).

    Google Scholar 

  7. Matteucci, I. (2008). Synthesis of secure systems. PhD thesis, University of Siena (April 2008).

    Google Scholar 

  8. NIST. (2013). Security and privacy controls for federal information systems and organizations: National Institute of Standards and Technology (NIST).

    Google Scholar 

  9. Dufel, M., Subramanium, V., & Chowdhury, M. (2014). Delivery of authentication information to a RESTful service using token validation scheme: Google Patents.

    Google Scholar 

  10. Sandhu, R. S., Coyne, E. J., Feinstein, H. L., & Youman, C. E. (1996). Role-based access control models. Computer, 29(2), 38–47.

    Article  Google Scholar 

  11. Kuhn, D. R., Hu, V. C., Polk, W. T., & Chang, S.-J. (2001). Introduction to public key technology and the federal PKI infrastructure.

    Google Scholar 

  12. NIST. (1994). Federal Information Processing Standard (FIPS) 191: National Institute of Standards and Technology (NIST).

    Google Scholar 

  13. Alsmadi, I., Burdwell R., Aleroud A., Wahbeh A., Al-Qudah, M. A., & Al-Omari, A. (2018). Practical information security. Cham: Springer.

    Google Scholar 

  14. CBS News, April 21, 2016. http://www.cbsnews.com/news/fbi-paid-more-than-1-million-for-san-bernardino-iphone-hack-james-comey/.

  15. Kimberly Underwood, DHS Builds Mobile Defenses, the cyber edge, July 1, 2018.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Izzat Alsmadi .

Rights and permissions

Reprints and permissions

Copyright information

© 2020 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Alsmadi, I. (2020). IT Risk and Security Management. In: The NICE Cyber Security Framework. Springer, Cham. https://doi.org/10.1007/978-3-030-41987-5_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-41987-5_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-41986-8

  • Online ISBN: 978-3-030-41987-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics