REVIEW OF RELEVANT STANDARDS AND LITERATURE REGARDING INFORMATION SYSTEMS RISK MANAGEMENT AND CONTROLS (Article published in Spanish)
DOI:
https://doi.org/10.1016/S0123-5923(11)70188-7Keywords:
Information systems, risk level, risk management and controls, standardAbstract
Risk management and controls in information systems (RMCIS) are important activities involved with management systems. Nevertheless, although organizations seem to have an interest in its application, RMCIS has not yet achieved its real impact because there is an inadequate understanding of its meaning or purpose and there is also a lack of organizational change processes needed for its implementation. This article presents a review of the current most relevant RMCIS standards for the purpose of proposing an integration of the roles and activities that organizations should carry out, together with an analysis of the risk levels and their implications for information systems.Downloads
References
Alberts, C., Behrens, S., Pethia, R. y Wilson, W. (1999). Operationally critical threat, asset, and vulnerability evaluations (OCTAVESM) framework, Version 1.0. TECHNICAL REPORT. CMU/SEI-99- TR-017. ESC-TR-99-017. Carnegie Mellon, SEE.
Ashenden, D. (2008). Information security management: A human challenge? Proceeding of Information Security Technical Report, 13(4), 195-201.
Ashenden, D. y Ezingeard, J.N. (2005). The need for a sociological approach to information security risk management. Documento no publicado, presentado en la 4th Annual Security Conference, Las Vegas, Nevada, Estados Unidos.
AS/NZS 4360:2004. (2004). Estándar Australiano. Administración de Riesgos (3 ed.). Sydney: Standards Australia International.
Baskerville, R. (1993). Information systems security design methods: Implications for information systems development. ACM Computing Surveys, 25(4), 375-414.
Blakley, B., McDermott, E. y Geer, D. (2001). Information security is information risk management. In NSPW -01 Proceedings of the 2001 workshop on new security paradigms (pp. 97-104). New York, NY: ACM.
Boehm, B.W. (1991). Software risk management: principles and practice. IEEE Software, 8(1), 32-41.
Cano, J. (2009). Monitoreo y evolución de la seguridad de la información. Revista ACIS, 110, 4-13.
Castilla, M., Herrera, L., Llanes, E. y Sánchez, D. (2004). Estudio de riesgos y controles del sistema de información de la Biblioteca Germán Bula Meyer. Recuperado el 25 de mayo de 2009, de http://www.scribd.com/doc/16445970/Riesgos-y-ControlProteccion-de-Datos-Biblioteca-GBM
Checkland, P. (2000). Systems thinking, systems practice. Includes a 30-year retrospective. New York, NY: John Wiley & Sons.
Checkland P. y Holwell, S. (1998). Information, systems and information systems: making sense of the field. New York, NY: John Wiley & Sons.
Checkland P. y Poulter, J. (2006). Learning for action. A short definitive account of soft systems methodology and its use for practitioners, teachers and students. New York, NY: John Wiley & Sons.
Checkland, P. y Scholes, J. (1999a). Information, Systems, and Information Systems. Cybernetics and humans knowing, 6(3), 91-95.
Checkland, P. y Scholes, J. (1999b). Soft system methodology in action. New York, NY: John Wiley & Sons.
Checkland, P. y Scholes, J. (2000). Soft systems methodology in action: a thirty year retrospective. System research and behavioral science, 17, S11-S58.
Chittister, C. y Haimes, Y.Y. (1993). Risks associated with software development: a holistic framework for assessment and management. IEEE Transactions on Systems, Man and Cybernetics, 23(3), 710-723.
Clusif, M. (2007). Guide de l analyse des risques. Recuperado el 11 de diciembre de 2009, de http://www.clusif.asso.fr
Contraloría General de la República de Nicaragua -CGRN. (1995). Normas técnicas de control interno para el sector público. Recuperado el 18 de abril de 2009, de http://legislacion.asamblea.gob.ni/normaweb.nsf/%28$All%29/804DEAE046418EEB062571790058C3B5?OpenDocument
Elissondo, L. (2008). Auditoria y Seguridad de Sistemas de Información. Recuperado el 8 de noviembre de 2011, de http://econ.unicen.edu.ar/monitorit/index.php?option=com_docman&task=doc_download&gid=175&Itemid=19
Fairley, R. (1994). Risk management for software projects. IEEE Software, 11(3), 57-67.
Farahmand, F., Navathe, S. y Enslow, P. (2003). Managing vulnerabilities of information systems to security incidents. Documento no publicado, presentado en The 5th International Conference on Electronic Commerce, Pittsburgh, PA, Estados Unidos. Recuperado de http://portal.acm.org/citation.cfm?id=948050
García, J. y Martínez, C. (2008). Análisis y control de riesgos de seguridad informática: control adaptativo un cambio de paradigma hacia la gestión de riesgos orientada al control adaptativo. Revista Sistemas ACIS, 105. Recuperado de http://www.acis.org.co/fileadmin/Revista_105/JMGarcia.pdf
Guerrero, M. (2010). Gestión de riesgos y controles en sistemas de información. Tesis de Maestría no publicada, Universidad Industrial de Santander, Bucaramanga, Colombia.
Haig, B. (2009). Man in the Middle. New York, NY: Grand Central Publishing.
Harold, F. y Tipton, M.K. (Eds.). (2006). Information Security Management Handbook (5a ed.). Danver, MA: CRC Press.
Hirsch, C. y Ezingeard, J.N. (2008). Perceptual and cultural aspects of risk management alignment: a case study. Journal of Information System Security, 4(1), 1551-0123.
ISACA. (2002). Documento S11. Recuperado el 19 de junio de 2009, de http://www.isaca.org
ISM3 Consortium. (2009). Information security management maturity model. Versión 2.0. Madrid, España.
ISO. (2005). ISO/IEC 27001:2005(E) Information technology - Security techniques - Information security management systems - Requirements. Londres: International Organization for Standardization and International Electrotechnical Commission.
ISO. (2008) Introduction to ISO 27005 (ISO27005). ICONTEC.
Landoll, D. (2005). The security risk assessment handbook: A complete guide for performing security risk assessments. Boca Raton, FL: Auerbach.
Laudon, K. y Laudon, J. (2008). Sistemas de información gerencial(10 ed.). México: Prentice Hall.
Leon, N. y Gomez, L.C. (2010). Propuesta de un modelo para la evaluación de calidad de productos software utilizados como apoyo a la biomedicina. Bucaramanga: Vicerrectoria de Investigación y Extensión, Universidad Industrial de Santander.
McFadzean, E., Ezineard, J.N. y Birchall, D. (2007). Perception of risk and the strategic impact of existing IT on Information Security strategy at board level. Online Information Review, 31(5), 622-660.
McLeod, R. (2000). Sistemas de información gerencial (7 ed.). México: Prentice Hall.
Ministerio de Administraciones Públicas. (1997). MAGUERIT. Metodología de Análisis y Gestión de Riesgos de los sistemas de información. España: Autores.
Norma RFC4949. (2007). Internet Security Glossary, Version 2. Recuperado el 24 de febrero de 2010, de http://www.ietf.org/rfc/rfc4949.
Norton, R. (2004). Crooked managers. Changing technology. Financial surprises. Who knows what company-killers lie ahead? Here's how directors can protect themselves. Institute of Public Administration of Canada. Toronto: Longwoods Publishing Corporation.
Peltier, T. (2001). Information security risk analysis. Boca Raton, FL: Auerbach Publications.
PriceWaterhouseCoopers. (2004). Managing risk: An assessment of CEO preparedness. Recuperado de http://www.pwc.com.
Ribagorda, A. (1997). Glosario de términos de seguridad de las T.I. Madrid: CODA.
Ross, R., Katzke, S., Johnson, A., Swanson, M. y Stoneburner, G. (2008). Managing risk from information systems an organizational perspective, Special Publication 800-839. Gaithersburg, MD: U.S. Dept. of Commerce, National Institute of Standards and Technology.
Schein, E.H. (1991) Psicología de la Organización. México: Prentice-Hall.
Silberfich, P.A. (2009). Análisis y Gestión de riesgos en TI ISO 27005 Aplicación Práctica. Documento no publicado presentado en el Quinto Congreso Argentino de Seguridad de la Información, Argentina.
Singh, S. y Brewer, R. (2008). The evolution of risk and controls from score-keeping to strategic partnering. KPGM International. Recuperado el 18 de diciembre de 2009, de http://sociedaddelainformacion.wordpress.com/category/seguridad/gestion-de-riesgos/
Smith, H., McKeen, J. y Staples D. (2001). Risk management in information systems: Problems and potential. Communications of the Association for Information Systems, 7(13).
SOMAP. (2006). Open Information Security Risk Management Handbook. Versión 1.0. Recuperado el 15 de diciembre de 2009, de http://ufpr.dl.sourceforge.net/project/somap/Infosec%20Risk%20Mgmt%20Handbook/Version%201.0/somap_handbook_v1.0.0.pdf
Stonebumer, G., Coguen, A. y Feringa, A. (2002). Risk Management Guide for Managing risk from information systems an organizational perspective, Special Publication 800-830. Gaithersburg, MD: U.S. Dept. of Commerce, National Institute of Standards and Technology.
Straub, D. y Welke, R. (1998). Coping with systems risk: Security planning models for management decision making. MIS Quarterly, 22(4), 441-469.
TCSEC - Trusted Computer Systems Evaluation Criteria, DoD 5200.28-STD, Department of Defense, United States of America, 1985.
Wah, L. (1998). The risky business of managing IT risks. Management Review, 87(5), 6.
Whitman, M. y Mattord, H. (2005). Principles of information security (2a ed.). Boston, MA: Thomson Course Technology.
Downloads
Published
Issue
Section
License
Articles are the sole responsibility of their authors, and will not compromise Icesi’s University principles or policies nor those of the Editorial Board of the journal Estudios Gerenciales. Authors authorize and accept the transfer of all rights to the journal, both for its print and electronic publication. After an article is published, it may be reproduced without previous permission of the author or the journal but the author(s), year, title, volume, number and range of pages of the publication must be mentioned. In addition, Estudios Gerenciales must be mentioned as the source (please, refrain from using Revista Estudios Gerenciales).