How can information security risk assessment and monitoring be implemented in real time?
| dc.contributor.author | Maupome, Mathieu | |
| dc.contributor.department | fi=Johtamisen ja yrittäjyyden laitos|en=Department of Management and Entrepreneurship| | |
| dc.contributor.faculty | fi=Turun kauppakorkeakoulu|en=Turku School of Economics| | |
| dc.contributor.studysubject | fi=Tietojärjestelmätiede|en=Information Systems Science| | |
| dc.date.accessioned | 2020-09-09T21:00:42Z | |
| dc.date.available | 2020-09-09T21:00:42Z | |
| dc.date.issued | 2020-06-18 | |
| dc.description.abstract | This research thesis aims to answer a business need on the creation of an artifact in order to enable information security risk assessment in real time. This research takes a design science approach to create an artifact. Another question was answered regarding the possible competitive advantage of this artifact when implemented for an organiza-tion. Secondary data was collected through a literature review and varied key elements are defined in order to design the artifact. In addition, four main factors that lead to competitive advantage are described. Interviews are conducted in order to gather pri-mary data and validate the literature review as well as offering new business insights on the artifact design and their beliefs on the possible competitive advantage of such a process. The research concludes that the artifact design is coherent and experts agreed on its viability. Experts conclude that enabling such a risk assessment would lead to competitive advantage, only if the risk management is operated at a strategic level. Prof. Dr. Anne-Françoise Rutkowski Prof. Dr. Patrick Rousseau Prof. Dr. Timo Leino | |
| dc.format.extent | 75 | |
| dc.identifier.olddbid | 167201 | |
| dc.identifier.oldhandle | 10024/150329 | |
| dc.identifier.uri | https://www.utupub.fi/handle/11111/21807 | |
| dc.identifier.urn | URN:NBN:fi-fe2020090969070 | |
| dc.language.iso | eng | |
| dc.rights | fi=Julkaisu on tekijänoikeussäännösten alainen. Teosta voi lukea ja tulostaa henkilökohtaista käyttöä varten. Käyttö kaupallisiin tarkoituksiin on kielletty.|en=This publication is copyrighted. You may download, display and print it for Your own personal use. Commercial use is prohibited.| | |
| dc.rights.accessrights | suljettu | |
| dc.source.identifier | https://www.utupub.fi/handle/10024/150329 | |
| dc.subject | Risk management, risk assessment, cyber security, real time assessment, real time monitoring, ISO/IEC 27001 & ISO/IEC 27005. | |
| dc.title | How can information security risk assessment and monitoring be implemented in real time? | |
| dc.type.ontasot | fi=Pro gradu -tutkielma|en=Master's thesis| |
Tiedostot
1 - 1 / 1