Analysis of information risk management methods
Zudin, Rodion
Analysis of information risk management methods
Jyväskylä: University of Jyväskylä, 2014, 33 p.
Information Systems, Bachelor’s Thesis
Supervisor: Siponen, Mikko
A brief overview in the information risk management field is done in this study
by introducing the shared terminology and methodology of the field using
literature overview in the first chapter. Second chapter consists of examining
and comparing two information risk management methodologies proposed by
two different guides: Risk Management Guide for Information Technology
Systems by National Institute of Standards and Technology and The Security
Risk Management Guide by Microsoft. By finding common factors and
methods shared by both guides, their shared approach for the information risk
management is attempted to be defined.
Metadata
Näytä kaikki kuvailutiedotKokoelmat
- Kandidaatintutkielmat [4986]
Samankaltainen aineisto
Näytetään aineistoja, joilla on samankaltainen nimeke tai asiasanat.
-
Cost-efficiency assessments of marine monitoring methods lack rigor : a systematic mapping of literature and an end-user view on optimal cost-efficiency analysis
Hyvärinen, Heini; Skyttä, Annaliina; Jernberg, Susanna; Meissner, Kristian; Kuosa, Harri; Uusitalo, Laura (Springer, 2021)Global deterioration of marine ecosystems, together with increasing pressure to use them, has created a demand for new, more efficient and cost-efficient monitoring tools that enable assessing changes in the status of ... -
A comparison of dyadic and social network assessments of peer influence
DeLay, Dawn; Laursen, Brett; Kiuru, Noona; Rogers, Adam; Kindermann,Thomas; Nurmi, Jari-Erik (SAGE Publications, 2021)The present study compares two methods for assessing peer influence: the longitudinal actor–partner interdependence model (L-APIM) and the longitudinal social network analysis (L-SNA) Model. The data were drawn from 1,995 ... -
Assessing the Performance of Interactive Multiobjective Optimization Methods : A Survey
Afsar, Bekir; Miettinen, Kaisa; Ruiz, Francisco (Association for Computing Machinery (ACM), 2021)Interactive methods are useful decision-making tools for multiobjective optimization problems, because they allow a decision-maker to provide her/his preference information iteratively in a comfortable way at the same time ... -
Looking for Peace of Mind? Manage your (Technical) Debt : An Exploratory Field Study
Ghanbari, Hadi; Besker, Terese; Martini, Antonio; Bosch, Jan (IEEE Computer Society Press, 2017)Background: In the last two decades Technical Debt (TD) has received a considerable amount of attention from software engineering research and practice. Recently, a small group of studies suggests that, in addition to ... -
Review of the methods for the development of information security policies at organizations
Wu, Shan (2016)This thesis aims to have an overview of the current studies in the development of information security policy. The research is based on a systematical literature review. The study focuses on the development process of ...
Ellei toisin mainittu, julkisesti saatavilla olevia JYX-metatietoja (poislukien tiivistelmät) saa vapaasti uudelleenkäyttää CC0-lisenssillä.