Managing Information Technology (IT) Security and Risk

Authors

  • Subhasish Roy Chowdhury Senior Risk and Vulnerability Manager (Retd, (Bennett Coleman & Co. Ltd. – The Times of India Group), Mumbai

DOI:

https://doi.org/10.33516/maj.v56i9.48-51p

Keywords:

No Keywords.

Abstract

Data and information are a valuable and very vital aspects and components of any present organization in the age of technology. It is an undeniably beneficial resource which enhances the quality of activity of any organization in terms of perfection, effectivity, timeliness etc. Therefore, there is a prominent and eminent requirement to have an adequate risk management process and techniques in place so that the risk of any threats can be immediately arrested and seized without causing any impairment or damage to the health of the organization.

Downloads

Download data is not yet available.

Published

2021-09-30

How to Cite

Chowdhury, S. R. (2021). Managing Information Technology (IT) Security and Risk. The Management Accountant Journal, 56(9), 48–51. https://doi.org/10.33516/maj.v56i9.48-51p

Issue

Section

Cover Story

References

Gary Stoneburner, Alice Goguen, Alexis Feringa (July 2002) Risk Management Guide for Information Technology Systems Recommendations of the National Institute of Standards and Technology NIST Special Publication 800-30.

Hamid Tohidi (Islamic Azad University, South Tehran Branch, Tehran, Iran – 2010) The Role of Risk Management in IT systems of organizations, www.sciencedirect.com, Procedia Computer Science 3 (2011) 881–887, 1877-0509, Published by Elsevier Ltd.

Sikender Mohsienuddin Mohammad (June 2020) Risk Management in Information Technology, https://www.researchgate.net/publication/342154796 , SSRN Electronic Journal

Simplilearn (2021) Top IT Risk Management Strategies and How to Apply Them

Jim Boehm, Peter Merrath, Thomas Poppensieker, Rolf Riemenschnitter, and Tobias Stähle (November 2018) Cyber risk measurement and the holistic cybersecurity approach (McKinsey & Company)

Conrow, Edmund H (2004) â€Risk Management for Systems of Systems.†Systems and Software Technology Conference, Salt Lake City, UT.

Thakurta, R. (2014). ‘Managing Software Projects Under Foreseen Uncertainty’ Journal of Information Technology Management, 25(2), 40-52.

Knut Haufe et al. (2016). ‘A process framework for information security management’ International Journal of Information Systems and Project Management, 27-47.

L. Lema et al. (2015 ). ‘ITIL in small to medium-sized enterprises software companies: towards an implementation sequence’ Journal of Software: Evolution and Process, vol. 27, no. 8, 528–538.

Talet, A. N., Mat-Zin, R., & Houari, M. (2014). ‘Risk Management and Information Technology Project’ International Journal of Digital Information and Wireless Communications, 4(1), 1-9.

https://www.slideshare.net/jderienzo/nist-800-30-flow-chart

Similar Articles

<< < 36 37 38 39 40 41 42 43 44 45 > >> 

You may also start an advanced similarity search for this article.