{"title":"管理中持续评估计算机风险,是敏捷项目","authors":"Monzón Escobar, Gumercindo Armando","doi":"10.1109/CONCAPANXXXIX47272.2019.8976980","DOIUrl":null,"url":null,"abstract":"In recent years there has been an increase in the issues of information security and cybersecurity, making the concern of security managers require more control over the ecosystem of organizations and the support of corporate governance for the acquisition of new technologies that can support a correct and integral management. The Continuous Computer Risk Assessment Model analyzes the ecosystem and recommends the use of important factors for a correct visibility and treatment of the risk by applying prevention and applicability methodologies of the maturity level to give the security manager a knowledge of a matrix that supports a more effective management in the areas of information security.","PeriodicalId":272652,"journal":{"name":"2019 IEEE 39th Central America and Panama Convention (CONCAPAN XXXIX)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Management in the continuous assessment of computer risk, an agile project\",\"authors\":\"Monzón Escobar, Gumercindo Armando\",\"doi\":\"10.1109/CONCAPANXXXIX47272.2019.8976980\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In recent years there has been an increase in the issues of information security and cybersecurity, making the concern of security managers require more control over the ecosystem of organizations and the support of corporate governance for the acquisition of new technologies that can support a correct and integral management. The Continuous Computer Risk Assessment Model analyzes the ecosystem and recommends the use of important factors for a correct visibility and treatment of the risk by applying prevention and applicability methodologies of the maturity level to give the security manager a knowledge of a matrix that supports a more effective management in the areas of information security.\",\"PeriodicalId\":272652,\"journal\":{\"name\":\"2019 IEEE 39th Central America and Panama Convention (CONCAPAN XXXIX)\",\"volume\":\"13 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 IEEE 39th Central America and Panama Convention (CONCAPAN XXXIX)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CONCAPANXXXIX47272.2019.8976980\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE 39th Central America and Panama Convention (CONCAPAN XXXIX)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CONCAPANXXXIX47272.2019.8976980","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Management in the continuous assessment of computer risk, an agile project
In recent years there has been an increase in the issues of information security and cybersecurity, making the concern of security managers require more control over the ecosystem of organizations and the support of corporate governance for the acquisition of new technologies that can support a correct and integral management. The Continuous Computer Risk Assessment Model analyzes the ecosystem and recommends the use of important factors for a correct visibility and treatment of the risk by applying prevention and applicability methodologies of the maturity level to give the security manager a knowledge of a matrix that supports a more effective management in the areas of information security.