Abstract
As the dependence on ICT in running organisations’ core services is increasing, so is the exposure to the associated risks due to ICT use. In order to meet organisational objectives in ICT dependent organisations, risks due to ICT insecurity need to be addressed effectively and adequately. To achieve this, organisations must have effective means for the management of ICT risks. This involves assessment of the actual exposure to ICT risks relevant to their environment and implementation of relevant countermeasures based on the assessment results. On the contrary, in most organisations, ICT security (or ICT risk management) is perceived by the top management as a technical problem. As a result, measures for ICT risk mitigation that are ultimately put in place in such organisations tend to be inadequate. Furthermore, the traditional way of managing risks by transferring them to the insurance companies is not yet working, as it is difficult to estimate the financial consequences due to ICT-related risks. There is, therefore, a need to have methods or ways which can assist in interpreting ICT risks into a financial context (senior management language) thereby creating a common understanding of ICT risks among technical people and the management within ICT-dependent organisations. With a common understanding, it would be possible to realise a coordinated approach towards ICT risk mitigation.
This paper is an attempt to investigate whether ICT risk mitigation can be enhanced using a customised software tool. A software tool for converting financial terminologies (financial risk exposure) to corresponding ICT security terminologies (countermeasures) is presented. The Estimated Maximum Information Technology Loss (EMitL) tool is investigated for its suitability as an operational tool for the above-mentioned purpose. EMitL is a tool utilised in a framework (Business Requirements on Information Technology Security - BRITS) to bridge the understanding gap between senior management and the technical personnel (when it comes to ICT risk management). This work is based on an empirical study which involved interviews and observations conducted in five non-commercial organisations in Tanzania. The study was designed to establish the state of ICT security management practice in the studied organisations.
The results of the study are being used here to investigate the applicability of the EMitL tool to address the observed state. The results from this study show that it is possible to customise EMitL into a usefully operational tool for interpreting risk exposure due to ICT into corresponding countermeasures. These results underline the need to further improve EMitL for wider use.
Chapter PDF
References
Alberts, C., and Dorofee, A., 2003, “Managing Information Security Risks”, the OCTAVE Approach, Addison Wesley, USA.
Anderson, A., and Shain, S., 1991, “Risk management in Information Security hand book, Macmillan publishers Ltd.
Bakari, J. K., 2005, “Towards A Holistic Approach for Managing ICT Security in Developing Countries: A Case Study Of Tanzania”, Ph.L thesis, Department of Computer and Systems Science, SU-KTH, Stockholm.
Bakari, J., Yngström, L., Magnusson, C, and Tarimo, C. N., 2005, “State of ICT Security Management in the Institutions of Higher Learning in Developing Countries: Tanzania Case study”, The 5th IEEE (ICALT 2005), Kaohsiung, Taiwan. Pp. 1007–1011
Baskerville, R., 1993, “Information Systems Security Design Methods: Implication for Information System Development”, ACM Computing Surveys, Vol.25, No.4.
Blakley, B., McDermott, E., and Geer, D., 2001 “Information Security is Information Risk Management” ACM Press, New York, USA.
Frisinger, A., 2001, ‘A Generic Security Evaluation Method for Open Distributed Systems’ Ph.D Thesis, Department of Teleinformatics, Royal Institute of Technology, Sweden.
ISACA, 2005, (April 15, 2005) http://www.isaca.org
ISO 17799, Information technology — Code of practice for information security management ITIL, 2005, (April 15, 2005); http://www.itil.org.uk/
Magnusson, C., 1999 “Hedging Shareholders Value in an IT dependent Business Society” THE FRAMEWORK BRITS, Ph.D Thesis, Department of Computer and Systems Science, University of Stockholm and the Royal Institute of Technology, Stockholm.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 International Federation for Information Processing
About this paper
Cite this paper
Bakari, J.K., Magnusson, C., Tarimo, C.N., Yngström, L. (2005). The Mitigation of ICT Risks Using Emitl Tool: An Empirical Study. In: Dowland, P., Furnell, S., Thuraisingham, B., Wang, X.S. (eds) Security Management, Integrity, and Internal Control in Information Systems. IICIS 2004. IFIP International Federation for Information Processing, vol 193. Springer, Boston, MA. https://doi.org/10.1007/0-387-31167-X_10
Download citation
DOI: https://doi.org/10.1007/0-387-31167-X_10
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-29826-9
Online ISBN: 978-0-387-31167-8
eBook Packages: Computer ScienceComputer Science (R0)