Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

Security requirements, risks and recommendations for small enterprise and home‐office environments

Security requirements, risks and recommendations for small enterprise and home‐office environments The pervasive use of information technology in enterprises of every size and the emergence of widely deployed ubiquitous networking technologies have brought with them a widening need for security. Information system security policy development must begin with a thorough analysis of sensitivity and criticality. Risk analysis methodologies, like CRAMM, provide the ability to analyse and manage the associated risks. By performing a risk analysis on a typical small enterprise and a home‐office set‐up the article identifies the risks associated with availability, confidentiality, and integrity requirements. Although both environments share weaknesses and security requirements with larger enterprises, the risk management approaches required are different in nature and scale. Their implementation requires co‐operation between end users, network service providers, and software vendors. http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png Information Management & Computer Security Emerald Publishing

Security requirements, risks and recommendations for small enterprise and home‐office environments

Loading next page...
 
/lp/emerald-publishing/security-requirements-risks-and-recommendations-for-small-enterprise-qjDKEkMCqz
Publisher
Emerald Publishing
Copyright
Copyright © 1999 MCB UP Ltd. All rights reserved.
ISSN
0968-5227
DOI
10.1108/09685229910371071
Publisher site
See Article on Publisher Site

Abstract

The pervasive use of information technology in enterprises of every size and the emergence of widely deployed ubiquitous networking technologies have brought with them a widening need for security. Information system security policy development must begin with a thorough analysis of sensitivity and criticality. Risk analysis methodologies, like CRAMM, provide the ability to analyse and manage the associated risks. By performing a risk analysis on a typical small enterprise and a home‐office set‐up the article identifies the risks associated with availability, confidentiality, and integrity requirements. Although both environments share weaknesses and security requirements with larger enterprises, the risk management approaches required are different in nature and scale. Their implementation requires co‐operation between end users, network service providers, and software vendors.

Journal

Information Management & Computer SecurityEmerald Publishing

Published: Aug 1, 1999

Keywords: Risk; Risk management; Small firms; Security; Recommendations

References