[go: up one dir, main page]

Olson et al., 2020 - Google Patents

Information Systems Security Risk

Olson et al., 2020

Document ID
12651117752476734763
Author
Olson D
Wu D
Publication year
Publication venue
Enterprise Risk Management Models

External Links

Snippet

Abstract Information systems security is critically important to organizations, private and public. We need the Internet to contact the world, and have benefited personally and economically from using the Web. But there have been many risks that have been identified …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce, e.g. shopping or e-commerce
    • G06Q30/01Customer relationship, e.g. warranty
    • G06Q30/018Business or product certification or verification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
    • G06Q10/063Operations research or analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting

Similar Documents

Publication Publication Date Title
Lee Cybersecurity: Risk management framework and investment cost analysis
US11611590B1 (en) System and methods for reducing the cybersecurity risk of an organization by verifying compliance status of vendors, products and services
US11640470B1 (en) System and methods for reducing an organization's cybersecurity risk by determining the function and seniority of employees
Gordon Official (ISC) 2 guide to the CISSP CBK
Rea-Guaman et al. AVARCIBER: a framework for assessing cybersecurity risks
Kostiuk et al. A system for assessing the interdependencies of information system agents in information security risk management using cognitive maps
Elahi Nezhad et al. Revolutionizing trade finance: leveraging the power of blockchain and AI in electronic letters of credit
Ramaj et al. Towards a DevSecOps-enabled framework for risk management of critical infrastructures
Davis Auditing Information and Cyber Security Governance: A Controls-based Approach
Ozkaya Cybersecurity Leadership Demystified: A comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO
Doshi CISA-Certified information systems auditor study guide
García-Porras et al. Information security risk management model for Peruvian SMEs
Afrifah et al. Barriers and opportunities in cyber risk and compliance management for data-driven supply chains
Olson et al. Information Systems Security Risk
Sigler et al. Securing an IT organization through governance, risk management, and audit
Chabani et al. The role of blockchain technology in enhancing security management in the supply chain
Kaur et al. Information Technology Risk Management
Sentosa et al. Enterprise Architecture of the Basic Banking Feature for a New Challenger of Digital Banking in Indonesia
Andrzejewski Security information management systems
Olson et al. Digitising Enterprise in an Information Age
Langer Cybersecurity in Analysis and Design
Odularu Data Security in Accounting and Information Management During the COVID-19 Pandemic
Rueda et al. Automating information security risk assessment for IT services
Kraus et al. Practice of the implementation cyber security and financial inclusion at the micro-, macro-and global levels of the economy
Ficco et al. Security SLAs for cloud services: Hadoop case study