Cyber-Risk Management: Technical and Insurance Controls for Enterprise-Level Security

Traditional approaches to security architecture and design have attempted to achieve the goal of the elimination of risk factors - the complete prevention of system compromise through technical and procedural means. Insurance- based solutions to risk long ago admitted that a complete elimination of...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Information systems security 2002-09, Vol.11 (4), p.33-49
Hauptverfasser: Siegel, Carol A., Sagalow, Ty R., Serritella, Paul
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 49
container_issue 4
container_start_page 33
container_title Information systems security
container_volume 11
creator Siegel, Carol A.
Sagalow, Ty R.
Serritella, Paul
description Traditional approaches to security architecture and design have attempted to achieve the goal of the elimination of risk factors - the complete prevention of system compromise through technical and procedural means. Insurance- based solutions to risk long ago admitted that a complete elimination of risk is impossible and, instead, have focused more on reducing the impact of harm through financial avenues, providing policies that indemnify the policy holder in the event of harm.
doi_str_mv 10.1201/1086/43322.11.4.20020901/38843.5
format Article
fullrecord <record><control><sourceid>pascalfrancis_infor</sourceid><recordid>TN_cdi_pascalfrancis_primary_13910011</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>13910011</sourcerecordid><originalsourceid>FETCH-LOGICAL-c288t-67d4e4c823ff2d26fee113e22402b980437f3e6939423970001fcc1bae8f65413</originalsourceid><addsrcrecordid>eNqNkE9Lw0AQxYMoWKvfIRfBS9L9l3TXkxKqFiuCttDbst3MajTdlN1Uybd301q8epqBmXlv3i-KrjBKMUF4hBHPR4xSQlKMU5YShAgSYUA5ZzTNjqIBFpQlPBfL49CjPEu44MvT6Mz7D4RQOOWDaFF0K3DJS-U_4ydl1RuswbbX8Rz0u620qmNly3hq_dYpqyEuGtu6pvaxaVw8sS24jas8JDP4gjp-Bb11VdudRydG1R4ufuswWtxN5sVDMnu-nxa3s0QTztskH5cMmOaEGkNKkhsAjCkQwhBZCY4YHRsKuaCCESrG4WlstMYrBdzkGcN0GN3sdbVrvHdgZPhmrVwnMZI9JtljkjtMEmPJ5AGT3GGSWZC43EtslA9xTR-z8n86VOBg21s97vcqG6Kv1Xfj6lK2qqsbdzii_3b9AUGef8k</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Cyber-Risk Management: Technical and Insurance Controls for Enterprise-Level Security</title><source>EBSCOhost Business Source Complete</source><creator>Siegel, Carol A. ; Sagalow, Ty R. ; Serritella, Paul</creator><creatorcontrib>Siegel, Carol A. ; Sagalow, Ty R. ; Serritella, Paul</creatorcontrib><description>Traditional approaches to security architecture and design have attempted to achieve the goal of the elimination of risk factors - the complete prevention of system compromise through technical and procedural means. Insurance- based solutions to risk long ago admitted that a complete elimination of risk is impossible and, instead, have focused more on reducing the impact of harm through financial avenues, providing policies that indemnify the policy holder in the event of harm.</description><identifier>ISSN: 1065-898X</identifier><identifier>EISSN: 1934-869X</identifier><identifier>DOI: 10.1201/1086/43322.11.4.20020901/38843.5</identifier><identifier>CODEN: ISSEFH</identifier><language>eng</language><publisher>Boca Raton, FL: Taylor &amp; Francis Group</publisher><subject>Applied sciences ; Computer science; control theory; systems ; Exact sciences and technology ; Memory and file management (including protection and security) ; Memory organisation. Data processing ; Operation, maintenance, reliability of teleprocessing networks ; Operational research and scientific management ; Operational research. Management science ; Risk theory. Actuarial science ; Software ; Telecommunications ; Telecommunications and information theory ; Teleprocessing networks. Isdn</subject><ispartof>Information systems security, 2002-09, Vol.11 (4), p.33-49</ispartof><rights>Copyright Taylor &amp; Francis Group, LLC 2002</rights><rights>2002 INIST-CNRS</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c288t-67d4e4c823ff2d26fee113e22402b980437f3e6939423970001fcc1bae8f65413</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&amp;idt=13910011$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><creatorcontrib>Siegel, Carol A.</creatorcontrib><creatorcontrib>Sagalow, Ty R.</creatorcontrib><creatorcontrib>Serritella, Paul</creatorcontrib><title>Cyber-Risk Management: Technical and Insurance Controls for Enterprise-Level Security</title><title>Information systems security</title><description>Traditional approaches to security architecture and design have attempted to achieve the goal of the elimination of risk factors - the complete prevention of system compromise through technical and procedural means. Insurance- based solutions to risk long ago admitted that a complete elimination of risk is impossible and, instead, have focused more on reducing the impact of harm through financial avenues, providing policies that indemnify the policy holder in the event of harm.</description><subject>Applied sciences</subject><subject>Computer science; control theory; systems</subject><subject>Exact sciences and technology</subject><subject>Memory and file management (including protection and security)</subject><subject>Memory organisation. Data processing</subject><subject>Operation, maintenance, reliability of teleprocessing networks</subject><subject>Operational research and scientific management</subject><subject>Operational research. Management science</subject><subject>Risk theory. Actuarial science</subject><subject>Software</subject><subject>Telecommunications</subject><subject>Telecommunications and information theory</subject><subject>Teleprocessing networks. Isdn</subject><issn>1065-898X</issn><issn>1934-869X</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2002</creationdate><recordtype>article</recordtype><recordid>eNqNkE9Lw0AQxYMoWKvfIRfBS9L9l3TXkxKqFiuCttDbst3MajTdlN1Uybd301q8epqBmXlv3i-KrjBKMUF4hBHPR4xSQlKMU5YShAgSYUA5ZzTNjqIBFpQlPBfL49CjPEu44MvT6Mz7D4RQOOWDaFF0K3DJS-U_4ydl1RuswbbX8Rz0u620qmNly3hq_dYpqyEuGtu6pvaxaVw8sS24jas8JDP4gjp-Bb11VdudRydG1R4ufuswWtxN5sVDMnu-nxa3s0QTztskH5cMmOaEGkNKkhsAjCkQwhBZCY4YHRsKuaCCESrG4WlstMYrBdzkGcN0GN3sdbVrvHdgZPhmrVwnMZI9JtljkjtMEmPJ5AGT3GGSWZC43EtslA9xTR-z8n86VOBg21s97vcqG6Kv1Xfj6lK2qqsbdzii_3b9AUGef8k</recordid><startdate>20020901</startdate><enddate>20020901</enddate><creator>Siegel, Carol A.</creator><creator>Sagalow, Ty R.</creator><creator>Serritella, Paul</creator><general>Taylor &amp; Francis Group</general><general>Auerbach</general><scope>IQODW</scope><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>20020901</creationdate><title>Cyber-Risk Management: Technical and Insurance Controls for Enterprise-Level Security</title><author>Siegel, Carol A. ; Sagalow, Ty R. ; Serritella, Paul</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c288t-67d4e4c823ff2d26fee113e22402b980437f3e6939423970001fcc1bae8f65413</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2002</creationdate><topic>Applied sciences</topic><topic>Computer science; control theory; systems</topic><topic>Exact sciences and technology</topic><topic>Memory and file management (including protection and security)</topic><topic>Memory organisation. Data processing</topic><topic>Operation, maintenance, reliability of teleprocessing networks</topic><topic>Operational research and scientific management</topic><topic>Operational research. Management science</topic><topic>Risk theory. Actuarial science</topic><topic>Software</topic><topic>Telecommunications</topic><topic>Telecommunications and information theory</topic><topic>Teleprocessing networks. Isdn</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Siegel, Carol A.</creatorcontrib><creatorcontrib>Sagalow, Ty R.</creatorcontrib><creatorcontrib>Serritella, Paul</creatorcontrib><collection>Pascal-Francis</collection><collection>CrossRef</collection><jtitle>Information systems security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Siegel, Carol A.</au><au>Sagalow, Ty R.</au><au>Serritella, Paul</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Cyber-Risk Management: Technical and Insurance Controls for Enterprise-Level Security</atitle><jtitle>Information systems security</jtitle><date>2002-09-01</date><risdate>2002</risdate><volume>11</volume><issue>4</issue><spage>33</spage><epage>49</epage><pages>33-49</pages><issn>1065-898X</issn><eissn>1934-869X</eissn><coden>ISSEFH</coden><abstract>Traditional approaches to security architecture and design have attempted to achieve the goal of the elimination of risk factors - the complete prevention of system compromise through technical and procedural means. Insurance- based solutions to risk long ago admitted that a complete elimination of risk is impossible and, instead, have focused more on reducing the impact of harm through financial avenues, providing policies that indemnify the policy holder in the event of harm.</abstract><cop>Boca Raton, FL</cop><pub>Taylor &amp; Francis Group</pub><doi>10.1201/1086/43322.11.4.20020901/38843.5</doi><tpages>17</tpages></addata></record>
fulltext fulltext
identifier ISSN: 1065-898X
ispartof Information systems security, 2002-09, Vol.11 (4), p.33-49
issn 1065-898X
1934-869X
language eng
recordid cdi_pascalfrancis_primary_13910011
source EBSCOhost Business Source Complete
subjects Applied sciences
Computer science
control theory
systems
Exact sciences and technology
Memory and file management (including protection and security)
Memory organisation. Data processing
Operation, maintenance, reliability of teleprocessing networks
Operational research and scientific management
Operational research. Management science
Risk theory. Actuarial science
Software
Telecommunications
Telecommunications and information theory
Teleprocessing networks. Isdn
title Cyber-Risk Management: Technical and Insurance Controls for Enterprise-Level Security
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-22T05%3A44%3A46IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-pascalfrancis_infor&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Cyber-Risk%20Management:%20Technical%20and%20Insurance%20Controls%20for%20Enterprise-Level%20Security&rft.jtitle=Information%20systems%20security&rft.au=Siegel,%20Carol%20A.&rft.date=2002-09-01&rft.volume=11&rft.issue=4&rft.spage=33&rft.epage=49&rft.pages=33-49&rft.issn=1065-898X&rft.eissn=1934-869X&rft.coden=ISSEFH&rft_id=info:doi/10.1201/1086/43322.11.4.20020901/38843.5&rft_dat=%3Cpascalfrancis_infor%3E13910011%3C/pascalfrancis_infor%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true