Combined Risk Assessment Model (C-RAM) for organizational information security /

Information security risk assessment plays an important role in the organization's future strategic planning. Generally, there are two types of risk assessment approaches: quantitative risk assessment and qualitative risk assessment. The quantitative risk assessment is an objective study of the...

Full description

Saved in:
Bibliographic Details
Main Author: Dioubate, Balla Moussa (Author)
Format: Thesis
Language:English
Published: Kuala Lumpur : Kulliyyah of Information and Communication Technology, International Islamic University Malaysia, 2017
Subjects:
Online Access:Click here to view 1st 24 pages of the thesis. Members can view fulltext at the specified PCs in the library.
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 041530000a22002890004500
008 170516s2017 my a f m 000 0 eng d
040 |a UIAM  |b eng  |e rda 
041 |a eng 
043 |a a-my--- 
050 0 0 |a HM1101 
100 1 |a Dioubate, Balla Moussa,  |e author 
245 1 |a Combined Risk Assessment Model (C-RAM) for organizational information security /  |c by Balla Moussa Dioubate 
264 1 |a Kuala Lumpur :  |b Kulliyyah of Information and Communication Technology, International Islamic University Malaysia,  |c 2017 
300 |a xiii, 101 leaves :  |b illustrations ;  |c 30cm. 
336 |2 rdacontent  |a text 
502 |a Thesis (MIT)--International Islamic University Malaysia, 2017. 
504 |a Includes bibliographical references (leaves 93-97). 
520 |a Information security risk assessment plays an important role in the organization's future strategic planning. Generally, there are two types of risk assessment approaches: quantitative risk assessment and qualitative risk assessment. The quantitative risk assessment is an objective study of the risk that use numerical data but it is difficult to conduct a purely quantitative risk assessment method, because of the difficulty to comprehend numerical data alone without a subjective explanation. On the other hand, the qualitative risk assessment is a subjective evaluation based on judgment and experiences which does not operate on numerical data. If implemented in silos, the limitations of both quantitative and qualitative methods may increase the likelihood of direct and indirect losses of an organization. In order to address this limitation, this thesis proposes to combine both quantitative and qualitative approaches to risk assessment. Hence, the proposed model is coined as Combined Risk Assessment Model (C-RAM). C-RAM incorporates a literal estimation of the identified security risks through a checklist and mathematical evaluation of risk probability. This model is adapted from the international standards for risk management (ISO 31000) and information security management (ISO 27002), and studies from information security risk management and risk assessment. The processes in C-RAM include risk identification, risk rating, risk calculation and result reporting. In order to interpret and apply the model, a prototype of risk assessment for information security was developed. Through this prototype, feedback from experts in information security and risk management was sought through qualitative approach using semi-structured interviews to evaluate the proposed model. The data collected from the participants was transcribed in verbatim and coded sentence-by-sentence in order to identify the themes and subthemes. Thus, a thematic analysis of the data was manually done in accordance with the responses provided by the participants. The feedback from experts supported the proposed model and agreed to the combination of the qualitative and quantitative risk assessment methods. The implementation of C-RAM can assist organizations to perform adequate risk assessment in order to manage information security impacts from natural and causal risks. C-RAM contributes to the significance of information security risk assessment/management studies in terms of research and practices. It can help organizations to manage and assess their information security risks for good decision-making purposes. 
596 |a 1 
655 7 |a Theses, IIUM local 
690 |a Dissertations, Academic  |x Department of Information Systems  |z IIUM 
710 2 |a International Islamic University Malaysia.  |b Department of Information Systems 
856 4 |u http://studentrepo.iium.edu.my/handle/123456789/5649  |z Click here to view 1st 24 pages of the thesis. Members can view fulltext at the specified PCs in the library. 
900 |a sbh-aaz-ls-naw 
999 |c 440468  |d 472215 
952 |0 0  |6 T HM 001101 D588C 2017  |7 0  |8 THESES  |9 763578  |a IIUM  |b IIUM  |c MULTIMEDIA  |g 0.00  |o t HM 1101 D588C 2017  |p 11100362075  |r 2017-10-17  |t 1  |v 0.00  |y THESIS 
952 |0 0  |6 TS CDF HM 1101 D588C 2017  |7 0  |8 THESES  |9 855866  |a IIUM  |b IIUM  |c MULTIMEDIA  |g 0.00  |o ts cdf HM 1101 D588C 2017  |p 11100362076  |r 2018-08-09  |t 1  |v 0.00  |y THESISDIG