Proceedings of the 21st International Conference on Enterprise Information Systems 2019
DOI: 10.5220/0007753503280336
|View full text |Cite
|
Sign up to set email alerts
|

A Structured Approach to Guide the Development of Incident Management Capability for Security and Privacy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
3

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 11 publications
0
2
0
1
Order By: Relevance
“…Therefore, it is common for the most recent organizations to depend on IT, these being internal and external drivers of the operations of a business, where the use of IT as the growth of technological tools helps to increase the quality of operations and in obtaining competitive advantages, such as: automate solutions in the storage, analysis and processing of information, which allows solving from complex collected data, to major problems that are present when serving users [4]. However, many companies, not having this technology, obtain inefficient processes and lack of reliability and integrity of the information to make decisions [5]; it should be noted that incident management is considered a key quality factor, in the social, scientific-technological, political, environmental and economic perspective in an organization, since it allows solving the incidents derived from the control and prevention of the various risks, thus reducing the negative impact on organizations [6]. In this sense, it is important to keep in mind that information is a valuable asset for all companies, because it is the knowledge of the organization and has an important role in guiding business analysts to make decisions [7].…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, it is common for the most recent organizations to depend on IT, these being internal and external drivers of the operations of a business, where the use of IT as the growth of technological tools helps to increase the quality of operations and in obtaining competitive advantages, such as: automate solutions in the storage, analysis and processing of information, which allows solving from complex collected data, to major problems that are present when serving users [4]. However, many companies, not having this technology, obtain inefficient processes and lack of reliability and integrity of the information to make decisions [5]; it should be noted that incident management is considered a key quality factor, in the social, scientific-technological, political, environmental and economic perspective in an organization, since it allows solving the incidents derived from the control and prevention of the various risks, thus reducing the negative impact on organizations [6]. In this sense, it is important to keep in mind that information is a valuable asset for all companies, because it is the knowledge of the organization and has an important role in guiding business analysts to make decisions [7].…”
Section: Introductionmentioning
confidence: 99%
“…Results from this phase will be used as feedback to improve cybersecurity incident management. The principal activities in this phase include the following [45]:…”
Section: Introductionmentioning
confidence: 99%
“…Untuk mengelola risiko keamanan data pribadi ASN pada sistem informasi kepegawaian, diperlukan sebuah framework atau kerangka kerja yang dapat dijadikan acuan. Framework standar yang dapat dijadikan acuan antara lain framework NIST Cybersecurity Framework [5], [6], NIST Special Publication 800-30 Revision 1 Guide for Conducting Risk Assessments [7], NIST Special Publication 800-34 Rev 1 Contingency Planning Guide for Federal Information Systems [8], NIST Special Publication 800-53 revision 5 Security and Privacy Controls for Information System and Organization [9], [10], NIST Special Publication 800-37 revision 2 Risk Management Framework for Information System and Organization [11], dan NIST Special Publication 800-61 revision 2 Computer Security Incident Handling Guide [12], [13].…”
unclassified