Journal Section

Journal of Information Technology Management and Business Horizons

Open Access

Cite Score: 0.8        Impact Factor: 1.4

Intelligence-driven Risk Management in Information Security Systems
Authors
Affiliations

1 Department of Business Administration, Westcliff University, Irvine, CA 92614,USA

2 Department of Information Technology, Westcliff University, Irvine, CA 92614, USA

Author's Details

Name: Anamika Tiwari

Email: a.tiwari.8501@westcliff.edu

Department: Department of Business Administration

Affiliation Number: 1

Address: Irvine, CA 92614,USA

Abstract
The task of making decisions in information security, when faced with unclear probabilities and unforeseen consequences of events in the constantly evolving cyber threat landscape, has gained significant importance. Cyber threat intelligence equips decision-makers with essential information and context to comprehend and predict future threats, hence minimizing ambiguity and enhancing the precision of risk assessments. Addressing uncertainty in decision-making demands the adoption of a new methodology led by threat intelligence (TI) and a risk analysis approach. This is a crucial aspect of evidence-based decision-making. Our proposed solution to this difficulty involves the implementation of a TI-based security assessment methodology and a decision-making strategy that takes into account both known unknowns and unknown unknowns. The proposed methodology seeks to improve decision-making quality by utilizing causal graphs, which provide an alternative to current methodologies that rely on attack trees, hence reducing uncertainty. In addition, we analyze strategies, methods, and protocols that are feasible, likely, and credible, enhancing our capacity to anticipate enemy actions. Our proposed approach offers practical counsel to information security leaders, enabling them to make well-informed decisions in uncertain circumstances. This paper presents a novel approach to tackling the problem of making decisions in uncertain situations in the field of information security. It intro...

Keywords: 

Agile IT Management, Business Flexibility, IT Project Management, Agile Methodologies, Customer Satisfaction, Agile Transformation, IT Infrastructure.

Citation

Share

This article is Open Access CC BY-NC
Centered Image 1.1k

Total Views

Centered Image 0.5k

Downloads

Centered Image 0

Citations

This tab lists articles citing this work.