[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2659651.2659665acmotherconferencesArticle/Chapter ViewAbstractPublication PagessinConference Proceedingsconference-collections
research-article

Sector-Specific Tool for Information Security Risk Management in the Context of Telecommunications Regulation (Tool demo)

Published: 09 September 2014 Publication History

Abstract

The current European regulation on public communications networks requires that Telecommunications Service Providers (TSPs) take appropriate technical and organisational measures to manage the risks posed to security of networks and services. After having adapted generic Information Security Risk Management (ISRM) process and practices to the telecommunications sector, these methodological aspects are integrated in a supporting tool dedicated to the TSPs. The objective of this paper is to present the features and our approach for fine-tuning TISRIM, our ISRM tool, to the telecommunications sector.

References

[1]
Dekker, M. and Karsberg, C. 2013. Technical Guideline on Security Measures - Technical guidance on the security measures in Article 13a. ENISA (The European Network and Information Security Agency).
[2]
ISO 31000 2009. Risk management -- Principles and guidelines. International Organization for Standardization.
[3]
ISO/IEC 27005 2011. Information technology -- Security techniques -- Information security risk management. International Organization for Standardization.
[4]
Mayer, N. A Cluster Approach to Security Improvement according to ISO/IEC 27001.
[5]
Mayer, N. et al. 2013. Sector-Based Improvement of the Information Security Risk Management Process in the Context of Telecommunications Regulation. Systems, Software and Services Process Improvement. F. McCaffery et al., eds. Springer Berlin Heidelberg. 13--24.
[6]
Official Journal of the European Union 2009. Directive 2009/140/EC of the European Parliament and of the Council of 25 November 2009.

Cited By

View all
  • (2022)Cybersecurity Risk Assessment: A Systematic Mapping Review, Proposal, and ValidationApplied Sciences10.3390/app1301039513:1(395)Online publication date: 28-Dec-2022
  • (2019)An integrated conceptual model for information system security risk management supported by enterprise architecture managementSoftware and Systems Modeling (SoSyM)10.1007/s10270-018-0661-x18:3(2285-2312)Online publication date: 18-Jul-2019
  • (2018)A Risk Integration Framework for the Service-Oriented EnterpriseInternational Journal of Information Systems in the Service Sector10.4018/IJISSS.201807010110:3(1-19)Online publication date: 1-Jul-2018
  • Show More Cited By

Index Terms

  1. Sector-Specific Tool for Information Security Risk Management in the Context of Telecommunications Regulation (Tool demo)

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Other conferences
      SIN '14: Proceedings of the 7th International Conference on Security of Information and Networks
      September 2014
      518 pages
      ISBN:9781450330336
      DOI:10.1145/2659651
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      In-Cooperation

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 09 September 2014

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Information Security
      2. Regulation
      3. Risk Management
      4. Telecommunication

      Qualifiers

      • Research-article
      • Research
      • Refereed limited

      Conference

      SIN '14

      Acceptance Rates

      SIN '14 Paper Acceptance Rate 32 of 109 submissions, 29%;
      Overall Acceptance Rate 102 of 289 submissions, 35%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)6
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 09 Mar 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2022)Cybersecurity Risk Assessment: A Systematic Mapping Review, Proposal, and ValidationApplied Sciences10.3390/app1301039513:1(395)Online publication date: 28-Dec-2022
      • (2019)An integrated conceptual model for information system security risk management supported by enterprise architecture managementSoftware and Systems Modeling (SoSyM)10.1007/s10270-018-0661-x18:3(2285-2312)Online publication date: 18-Jul-2019
      • (2018)A Risk Integration Framework for the Service-Oriented EnterpriseInternational Journal of Information Systems in the Service Sector10.4018/IJISSS.201807010110:3(1-19)Online publication date: 1-Jul-2018
      • (2016)Defining measurements for analyzing information security risk reports in the telecommunications sectorProceedings of the 31st Annual ACM Symposium on Applied Computing10.1145/2851613.2851847(2189-2194)Online publication date: 4-Apr-2016

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media