{"title":"云环境下的信息安全风险评估方法","authors":"Lidia Maria Bruma","doi":"10.24818/issn14531305/24.4.2020.03","DOIUrl":null,"url":null,"abstract":"Cloud technology has revolutionized the way computational resources are accessed, offering benefits that have led to widespread adoption. The risk of losing important data is one of the reasons why some organizations do not adopt the migration to a public cloud or adopt the partial migration of information that is not critical. The process of risk assessment should be done since the initial stage of a project and become a continuous process. It is an essential process that help management structure to take strategic decision about security mechanisms needed to be implemented to avoid information leaks and about the costs and impact of unexpected events. This paper presents the process of information security risk assessment as well as the importance of knowledge of the associated risks. The paper also proposes a model for determining risk of data security according to their importance for the organization, which provides an overview of vulnerabilities and their real impact on assets. Furthermore, the proposed model helps organizations to choose the right methods to ensure the optimal level of security, in line with operational requirements and critical information.","PeriodicalId":53248,"journal":{"name":"Informatica economica","volume":"112 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2020-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"An Approach for Information Security Risk Assessment in Cloud Environments\",\"authors\":\"Lidia Maria Bruma\",\"doi\":\"10.24818/issn14531305/24.4.2020.03\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cloud technology has revolutionized the way computational resources are accessed, offering benefits that have led to widespread adoption. The risk of losing important data is one of the reasons why some organizations do not adopt the migration to a public cloud or adopt the partial migration of information that is not critical. The process of risk assessment should be done since the initial stage of a project and become a continuous process. It is an essential process that help management structure to take strategic decision about security mechanisms needed to be implemented to avoid information leaks and about the costs and impact of unexpected events. This paper presents the process of information security risk assessment as well as the importance of knowledge of the associated risks. The paper also proposes a model for determining risk of data security according to their importance for the organization, which provides an overview of vulnerabilities and their real impact on assets. Furthermore, the proposed model helps organizations to choose the right methods to ensure the optimal level of security, in line with operational requirements and critical information.\",\"PeriodicalId\":53248,\"journal\":{\"name\":\"Informatica economica\",\"volume\":\"112 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-12-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Informatica economica\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.24818/issn14531305/24.4.2020.03\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Informatica economica","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.24818/issn14531305/24.4.2020.03","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An Approach for Information Security Risk Assessment in Cloud Environments
Cloud technology has revolutionized the way computational resources are accessed, offering benefits that have led to widespread adoption. The risk of losing important data is one of the reasons why some organizations do not adopt the migration to a public cloud or adopt the partial migration of information that is not critical. The process of risk assessment should be done since the initial stage of a project and become a continuous process. It is an essential process that help management structure to take strategic decision about security mechanisms needed to be implemented to avoid information leaks and about the costs and impact of unexpected events. This paper presents the process of information security risk assessment as well as the importance of knowledge of the associated risks. The paper also proposes a model for determining risk of data security according to their importance for the organization, which provides an overview of vulnerabilities and their real impact on assets. Furthermore, the proposed model helps organizations to choose the right methods to ensure the optimal level of security, in line with operational requirements and critical information.