BibTex RIS Cite
Year 2010, Volume: 3 Issue: 1 - Volume: 3 Issue: 1, 47 - 52, 24.06.2016

Abstract

Risk assessment and management are important
parts of Information Security Management Systems.
Therefore, lots of risk analysis and evaluation
research has been conducted and there are many
publications in literature. In this work, a risk
evaluation model is proposed for assets related
Information Security Management Systems. In our
model risk of assets is evaluated using the changing
attributes of assets for each threat.

References

  • JHP. Eloff, MM. Eloff, 2005. Information security architecture, Computer Fraud and Security, vol. 11, pp 10-16.
  • Rolf Moulton, Robert S. Coles, 2003. Applying Information Security Governence, Computers & Security, Vol 22, No 7, pp 580- 584.
  • ISO/IEC 17799, 2000. Information Technology-Code of practice for Information security management, Switzerland: Internetional Organization for standardization (ISO).
  • ISO/IEC 27001, 2005. Information Security Management Systems–requirements, ISO.
  • Bob Blakley, Ellen McDermott, Dan Geer, 2001. Information security is information risk management, NSPW, 97-104.
  • B.Karabacak, İ.Soğukpınar, 2005. ISRAM: Information Security Risk Analysis Method, Computers & Security, Volume 24, Issue 2, Pages 147-159.
  • A. Vorster and L. Labuschagne, 2005. A framework for comparing different information security risk analysis methodologies. Proceedings of SAICSIT '0, pages 95-103
  • NIST Special Publicaiton 800-30, 2002. Risk management guide for information technology systems.
  • United States General Accounting Office (USGAO), 1999. Information security risk assessment, <http://www.gao.gov/cgi- bin/getrpt?GAO/AIMD-00-33>. consultant products for windows. Evaluation & user guide.
  • United Kingdom Central Computer and Telecommunicaiton Agency (CCTA), 2001. Risk analysis and management method, CRAMM user guide, Issue 2.0.
  • Howard, JD, 1997. An analysis of security incidents on the internet 1989–1995. PhD thesis, Carnegie Mellon University.

Bilgi Güvenliği Yönetiminde Risk Değerlendirmesi İçin Bir Model

Year 2010, Volume: 3 Issue: 1 - Volume: 3 Issue: 1, 47 - 52, 24.06.2016

Abstract

Risk değerlendirme ve risk yönetimi, bilgi güvenliği yönetim sistemlerinin önemli parçalarıdır. Bu yüzden, literatürde konuyla ilgili çok sayıda risk değerlendirme ve analiz çalışması vardır. Bu çalışmada, Bilgi Güvenliği Yönetim Sistemleri ile ilişkili varlıklar için bir risk değerlendirme modeli önerilmiştir. Önerilen model, riski varlıkların değerlerindeki değişime bağlı olarak hesap etmektedir. Model, soysal bir ağ üzerinde bazı varlıklar için test edilmiştir.

References

  • JHP. Eloff, MM. Eloff, 2005. Information security architecture, Computer Fraud and Security, vol. 11, pp 10-16.
  • Rolf Moulton, Robert S. Coles, 2003. Applying Information Security Governence, Computers & Security, Vol 22, No 7, pp 580- 584.
  • ISO/IEC 17799, 2000. Information Technology-Code of practice for Information security management, Switzerland: Internetional Organization for standardization (ISO).
  • ISO/IEC 27001, 2005. Information Security Management Systems–requirements, ISO.
  • Bob Blakley, Ellen McDermott, Dan Geer, 2001. Information security is information risk management, NSPW, 97-104.
  • B.Karabacak, İ.Soğukpınar, 2005. ISRAM: Information Security Risk Analysis Method, Computers & Security, Volume 24, Issue 2, Pages 147-159.
  • A. Vorster and L. Labuschagne, 2005. A framework for comparing different information security risk analysis methodologies. Proceedings of SAICSIT '0, pages 95-103
  • NIST Special Publicaiton 800-30, 2002. Risk management guide for information technology systems.
  • United States General Accounting Office (USGAO), 1999. Information security risk assessment, <http://www.gao.gov/cgi- bin/getrpt?GAO/AIMD-00-33>. consultant products for windows. Evaluation & user guide.
  • United Kingdom Central Computer and Telecommunicaiton Agency (CCTA), 2001. Risk analysis and management method, CRAMM user guide, Issue 2.0.
  • Howard, JD, 1997. An analysis of security incidents on the internet 1989–1995. PhD thesis, Carnegie Mellon University.
There are 11 citations in total.

Details

Other ID JA37HC89HK
Journal Section Makaleler(Araştırma)
Authors

Hidayet Takçı This is me

Türker Akyüz This is me

Alper Uğur This is me

Rahim Karabağ This is me

F. Özden Aktaş This is me

İbrahim Soğukpınar This is me

Publication Date June 24, 2016
Published in Issue Year 2010 Volume: 3 Issue: 1 - Volume: 3 Issue: 1

Cite

APA Takçı, H., Akyüz, T., Uğur, A., Karabağ, R., et al. (2016). Bilgi Güvenliği Yönetiminde Risk Değerlendirmesi İçin Bir Model. Türkiye Bilişim Vakfı Bilgisayar Bilimleri Ve Mühendisliği Dergisi, 3(1), 47-52.
AMA Takçı H, Akyüz T, Uğur A, Karabağ R, Aktaş FÖ, Soğukpınar İ. Bilgi Güvenliği Yönetiminde Risk Değerlendirmesi İçin Bir Model. TBV-BBMD. June 2016;3(1):47-52.
Chicago Takçı, Hidayet, Türker Akyüz, Alper Uğur, Rahim Karabağ, F. Özden Aktaş, and İbrahim Soğukpınar. “Bilgi Güvenliği Yönetiminde Risk Değerlendirmesi İçin Bir Model”. Türkiye Bilişim Vakfı Bilgisayar Bilimleri Ve Mühendisliği Dergisi 3, no. 1 (June 2016): 47-52.
EndNote Takçı H, Akyüz T, Uğur A, Karabağ R, Aktaş FÖ, Soğukpınar İ (June 1, 2016) Bilgi Güvenliği Yönetiminde Risk Değerlendirmesi İçin Bir Model. Türkiye Bilişim Vakfı Bilgisayar Bilimleri ve Mühendisliği Dergisi 3 1 47–52.
IEEE H. Takçı, T. Akyüz, A. Uğur, R. Karabağ, F. Ö. Aktaş, and İ. Soğukpınar, “Bilgi Güvenliği Yönetiminde Risk Değerlendirmesi İçin Bir Model”, TBV-BBMD, vol. 3, no. 1, pp. 47–52, 2016.
ISNAD Takçı, Hidayet et al. “Bilgi Güvenliği Yönetiminde Risk Değerlendirmesi İçin Bir Model”. Türkiye Bilişim Vakfı Bilgisayar Bilimleri ve Mühendisliği Dergisi 3/1 (June 2016), 47-52.
JAMA Takçı H, Akyüz T, Uğur A, Karabağ R, Aktaş FÖ, Soğukpınar İ. Bilgi Güvenliği Yönetiminde Risk Değerlendirmesi İçin Bir Model. TBV-BBMD. 2016;3:47–52.
MLA Takçı, Hidayet et al. “Bilgi Güvenliği Yönetiminde Risk Değerlendirmesi İçin Bir Model”. Türkiye Bilişim Vakfı Bilgisayar Bilimleri Ve Mühendisliği Dergisi, vol. 3, no. 1, 2016, pp. 47-52.
Vancouver Takçı H, Akyüz T, Uğur A, Karabağ R, Aktaş FÖ, Soğukpınar İ. Bilgi Güvenliği Yönetiminde Risk Değerlendirmesi İçin Bir Model. TBV-BBMD. 2016;3(1):47-52.

Article Acceptance

Use user registration/login to upload articles online.

The acceptance process of the articles sent to the journal consists of the following stages:

1. Each submitted article is sent to at least two referees at the first stage.

2. Referee appointments are made by the journal editors. There are approximately 200 referees in the referee pool of the journal and these referees are classified according to their areas of interest. Each referee is sent an article on the subject he is interested in. The selection of the arbitrator is done in a way that does not cause any conflict of interest.

3. In the articles sent to the referees, the names of the authors are closed.

4. Referees are explained how to evaluate an article and are asked to fill in the evaluation form shown below.

5. The articles in which two referees give positive opinion are subjected to similarity review by the editors. The similarity in the articles is expected to be less than 25%.

6. A paper that has passed all stages is reviewed by the editor in terms of language and presentation, and necessary corrections and improvements are made. If necessary, the authors are notified of the situation.

0

.   This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.