Olson et al., 2020 - Google Patents
Information Systems Security RiskOlson et al., 2020
- Document ID
- 12651117752476734763
- Author
- Olson D
- Wu D
- Publication year
- Publication venue
- Enterprise Risk Management Models
External Links
Snippet
Abstract Information systems security is critically important to organizations, private and public. We need the Internet to contact the world, and have benefited personally and economically from using the Web. But there have been many risks that have been identified …
- 238000000034 method 0 abstract description 25
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce, e.g. shopping or e-commerce
- G06Q30/01—Customer relationship, e.g. warranty
- G06Q30/018—Business or product certification or verification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
- G06Q10/063—Operations research or analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Lee | Cybersecurity: Risk management framework and investment cost analysis | |
US11611590B1 (en) | System and methods for reducing the cybersecurity risk of an organization by verifying compliance status of vendors, products and services | |
US11640470B1 (en) | System and methods for reducing an organization's cybersecurity risk by determining the function and seniority of employees | |
Gordon | Official (ISC) 2 guide to the CISSP CBK | |
Rea-Guaman et al. | AVARCIBER: a framework for assessing cybersecurity risks | |
Kostiuk et al. | A system for assessing the interdependencies of information system agents in information security risk management using cognitive maps | |
Elahi Nezhad et al. | Revolutionizing trade finance: leveraging the power of blockchain and AI in electronic letters of credit | |
Ramaj et al. | Towards a DevSecOps-enabled framework for risk management of critical infrastructures | |
Davis | Auditing Information and Cyber Security Governance: A Controls-based Approach | |
Ozkaya | Cybersecurity Leadership Demystified: A comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO | |
Doshi | CISA-Certified information systems auditor study guide | |
García-Porras et al. | Information security risk management model for Peruvian SMEs | |
Afrifah et al. | Barriers and opportunities in cyber risk and compliance management for data-driven supply chains | |
Olson et al. | Information Systems Security Risk | |
Sigler et al. | Securing an IT organization through governance, risk management, and audit | |
Chabani et al. | The role of blockchain technology in enhancing security management in the supply chain | |
Kaur et al. | Information Technology Risk Management | |
Sentosa et al. | Enterprise Architecture of the Basic Banking Feature for a New Challenger of Digital Banking in Indonesia | |
Andrzejewski | Security information management systems | |
Olson et al. | Digitising Enterprise in an Information Age | |
Langer | Cybersecurity in Analysis and Design | |
Odularu | Data Security in Accounting and Information Management During the COVID-19 Pandemic | |
Rueda et al. | Automating information security risk assessment for IT services | |
Kraus et al. | Practice of the implementation cyber security and financial inclusion at the micro-, macro-and global levels of the economy | |
Ficco et al. | Security SLAs for cloud services: Hadoop case study |