A Research Study of Risk Management in Information Security

-

Authors

  • Jhujhar Singh
  • Dr. Om Parkash

Keywords:

risk management, information security, computer systems, security risks, privacy risks, judicial risks, speculative risk, quantitative assessment, qualitative assessment, risk exposure

Abstract

The risks associated with computer systems have been enormous for many years and still exist today. This article discusses several types of risks, including security, privacy, and judicial risks. Risk is usually defined as a function of event likelihood and impact and is divided into two categories speculative and non-speculative. Speculative risk is the risk of taking risks to gain potential benefits. There are two main ways to assess risk quantitative and qualitative. Risk management means consciously determining risk exposure. The starting point for the risk management process is to determine the risk acceptance criteria and reflect the risks that people are willing to accept.

Downloads

Published

2017-01-01

How to Cite

[1]
“A Research Study of Risk Management in Information Security: -”, JASRAE, vol. 12, no. 2, pp. 1343–1347, Jan. 2017, Accessed: Aug. 07, 2025. [Online]. Available: https://ignited.in/index.php/jasrae/article/view/6425

How to Cite

[1]
“A Research Study of Risk Management in Information Security: -”, JASRAE, vol. 12, no. 2, pp. 1343–1347, Jan. 2017, Accessed: Aug. 07, 2025. [Online]. Available: https://ignited.in/index.php/jasrae/article/view/6425