The Effect of Organisational Structure and Culture on Information Security Risk Processes

Topics: Management, Risk, Information security Pages: 1 (331 words) Published: August 10, 2009
Risk assessment is regarded as an integral part of any information security management framework. This is because an information security management framework exists to enable an organisation to maximise the use of its information within a level of risk that is acceptable to the organisation. In information security management literature risk assessment processes are presented as pivotal to the success of the information security management framework. Risk assessment is used to establish the ISMS, determine the information security risks that an organisation faces, and identify the security countermeasures necessary to reduce the risks to an appropriate level. The emphasis is on an “appropriate response” to the measure of risk where appropriate is considered in the overall context of the organisation.

Risk assessment is enmeshed with additional organisational processes that construct what is termed an Information Security Management System (ISMS). An information security management system is primarily described in the information security management standard ISO 27001 [9, clauses 4-8]. It is an abstracted organisational model found in information security management literature which articulates a systematised view of the information security management functions and processes described in much of the information security management literature. The role of an Information Security Management System (ISMS) is to ensure that adequate controls are “established, implemented, monitored, reviewed and improved, where necessary, to ensure that the specific security and business objectives of an organisation are met.'' [8, p. viii]. In this regard, an ISMS is comprised of logical management functions and management processes. The relationship between risk assessment and the other information security management processes is described in Figure One which shows that the processes interact in a continuous loop, termed the Plan-Do-Check-Act cycle (PDCA) or Deming Wheel in...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Information Security Risk Management Essay
  • Risk Management in Information Technology Security Essay
  • Information Security Risk Analysis and Management Essay
  • information systems risk and security Essay
  • Comparisons of Information Security Management Frameworks Essay
  • Essay about security
  • Essay about culture
  • Essay about Information Security

Become a StudyMode Member

Sign Up - It's Free