Managing the Asset Risk of SMEs

作者: Luís Enrique Sánchez , Carlos Ruiz , Eduardo Fernández-Medina , Mario Piattini

DOI: 10.1109/ARES.2010.52

关键词:

摘要: The information society is becoming increasingly dependent on systems for managing and analyzing the risk to which its main assets are exposed having access these has become vital evolution of SMEs. However, this type company requires be adapted their special characteristics optimized from point view resources required set them up maintain them. This article presents a proposed method carrying out analysis adaptation, suitable SMEs, within framework methodology security management in small medium-sized enterprises (MSM2-SME). model being applied directly real cases, therefore application constantly improved.

参考文章(22)
Eduardo Fernández-Medina, Mario Piattini, Daniel Villafranca, Luís Enrique Sánchez, DEVELOPING A MODEL AND A TOOL TO MANAGE THE INFORMATION SECURITY IN SMALL AND MEDIUM ENTERPRISES international conference on security and cryptography. pp. 355- 362 ,(2007)
Terttu Orci, Astrid Laryd, None, CMM for Small Organisations ,(2000)
Eduardo Fernández-Medina, Mario Piattini, Daniel Villafranca, Luís Enrique Sánchez, SCMM-TOOL - Tool for Computer Automation of the Information Security Management Systems international conference on software and data technologies. pp. 311- 318 ,(2007)
Murray E. Jennex, Steven Furnell, Vassilis Dimopoulos, Ioannis Kritharas, Approaches to IT Security in Small and Medium Enterprises. australian information security management conference. pp. 73- 82 ,(2004)
Eduardo Fernández-Medina, Mario Piattini, Daniel Villafranca, Luís Enrique Sanchez, PRACTICAL APPLICATION OF A SECURITY MANAGEMENT MATURITY MODEL FOR SMES BASED ON PREDEFINED SCHEMAS international conference on security and cryptography. pp. 391- 398 ,(2008)
Diana Mekelburg, Sustaining Best Practices: How Real-World Software Organizations Improve Quality Processes Software Quality Professional Magazine. ,vol. 7, ,(2005)
Timo Wiander, Implementing the ISO/IEC 17799 standard in practice: experiences on audit phases artificial intelligence and symbolic computation. pp. 115- 119 ,(2008)
Linda Volonino, Stephen R. Robinson, Principles and Practice of Information Security Principles and Practice of Information Security. pp. 275- 275 ,(2003)
Audrey Dorofee, Christopher J. Alberts, Managing Information Security Risks: The OCTAVE Approach ,(2002)
Anas Tawileh, Jeremy Hilton, Stephen McIntosh, Managing Information Security in Small and Medium Sized Enterprises: A Holistic Approach Innovations in Systems and Software Engineering. pp. 331- 339 ,(2007) , 10.1007/978-3-8348-9418-2_35