Login | Register

Using Dashboards to Reach Acceptable Risk in Statistics Data Centers Through Risk Assessment and Impact Analysis

Title:

Using Dashboards to Reach Acceptable Risk in Statistics Data Centers Through Risk Assessment and Impact Analysis

Amin, Atif and Valverde, Raul (2017) Using Dashboards to Reach Acceptable Risk in Statistics Data Centers Through Risk Assessment and Impact Analysis. In: Engineering and Management of Data Centers: An IT Service Management Approach. Springer International Publishing. (In Press)

[img]
Preview
Text (application/pdf)
394202_1_En_3_Chapter_Author.pdf - Accepted Version
Available under License Spectrum Terms of Access.
1MB

Official URL: http://www.springer.com/gp/book/9783319650814

Abstract

A well designed and integrated database used to present risk management information by using a dashboard interface supported by real time risk management data makes it easy for risk managers to reach a full understanding of the surrounding threats and allows them to find the proper and right controls to mitigate them. The chapter presents a case study for a statistics data center that shows that the calculation of total risk at the organization level is possible by using the proposed risk database that supports decision makers when threats hit the organization. The chapter also shows that presenting the risk level on a dashboard viewer makes risk level clearer for a decision maker in a statistics data center and assists in the creation of a tool to follow-up risk management since the time a threat hits till the time of its mitigation.

Divisions:Concordia University > John Molson School of Business > Supply Chain and Business Technology Management
Item Type:Book Section
Refereed:Yes
Authors:Amin, Atif and Valverde, Raul
Date:23 November 2017
Keywords:Data centers - Risk management - Dashboards
ID Code:983102
Deposited By: RAUL VALVERDE
Deposited On:05 Oct 2017 12:50
Last Modified:18 Jan 2018 17:56

References:

Almadhoob, A., Valverde, R.: Cybercrime prevention in the Kingdom of Bahrain via IT security audit plans. J. Theor. Appl. Inf. Technol. 65(1), 274–292 (2014)

Calder, A., Watkins, S.: I. T. Governance. A Manager’s Guide to Data Security and ISO 27001/ISO 27002. Kogan Page, London (2008)

Dawson, C.W.: Projects in Computing and Information Systems: A Student’s Guide. Pearson Education, Harlow (2009)

DeSouza, E., Valverde, R.: An employee-based risk management strategy for reducing security incidents in a Canadian PHIPA regulated environment. In: International Conference on Innovations in Computer Science and Information Technology (ICICSIT -2015), Hyderabad (2015)

Harris, S.: CISSP All-in-One Exam Guide. McGraw-Hill Inc., New York (2008)

Khan, N.A., Valverde, R.: The use of RFID based supply chain systems in data centers for the improvement of the performance of financial institutions. Eng. Manage. Res. 3(1), 1–24 (2014)

Kouns, J., Minoli, D.: Information Technology Risk Management in Entreprise Environments. Wiley (2010)

Landoll, D.: The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments. CRC Press, Boca Raton (2006)

Nijburg, E., Valverde, R.: A business continuity monitoring model for distributed architectures: a case study. Int. J. Appl. Sci. Technol. 1(2), 5–14 (2011)

Stephens, J., Valverde, R.: Security of e-procurement transactions in supply chain reengineering. Comput. Inf. Sci. 6(3), (2013)

Stoneburner, G., Goguen, A.Y., Feringa, A. Sp 800-30. risk management guide for information technology systems. National Institute of Standards and Technology (2002)

Tan, D. Quantitative risk analysis step-by-step. SANS Institute (2002)

Wheeler, E.: Security Risk Management: Building an Information Security Risk Management Program from the Ground Up. Elsevier (2011)

Wolden, M., Valverde, R., Talla, M.: The effectiveness of COBIT 5 information security framework for reducing cyber attacks on supply chain management system. IFAC-PapersOnLine. 48(3), 1846–1852 (2015)
All items in Spectrum are protected by copyright, with all rights reserved. The use of items is governed by Spectrum's terms of access.

Repository Staff Only: item control page

Downloads per month over past year

Back to top Back to top