Digital Library

cab1

 
Title:      THE INFORMATION INFRASTRUCTURE RISK FORENSICS
Author(s):      Diego Abbo , Lily Sun
ISBN:      978-972-8924-97-3
Editors:      Hans Weghorn and Pedro Isaías
Year:      2009
Edition:      V II, 2
Keywords:      Information Infrastructure, security measurement, risks assessment
Type:      Reflection Paper
First Page:      308
Last Page:      312
Language:      English
Cover:      cover          
Full Contents:      click to dowload Download
Paper Abstract:      In the growing world of ICT systems the challenges of our increasing dependency on, and use of, enormous volumes of information necessitates a review of traditional approaches to information infrastructure and risk management. The risk assessment and management are scientific approached processes even if it is not possible to certified them according a standard regulatory system. What is possible is to assess the risk, in dependency of a given situation, and to measure it with a scientifically known range of uncertainty. It is also possible to individuate the global risk among interconnected systems and how performs the “risk interconnection”. The aim of this essay is, beyond the definition of an “Information Infrastructure”, individuate a methodology for setting up both a reference conceptual lay-out and an integrated set of interactive models applicable to any existing or designed ICT system linked to the national and supranational Information Infrastructure. The reference conceptual lay–out is linked to the idea of creating a scientific research tools for “ICT risk analysis”; that is a new operational proposed perspective, that is aiming to individuate the domains of pure risk and speculative risk and to individuate the forensics for reject, accept or transfer risks related to Information Infrastructure If it is possible, in a defined frame, to establish mathematical and logical rules and measurable connections among all the variables it is possible to have, with a known range of inaccuracy, the vision of business risks, ICT architectural performances, security dimension and last but not least information competitive advantage
   

Social Media Links

Search

Login