Современные
информационные технологии/4. Информационная
безопасность.
Karlygash Mukhitova
International University Information Technology
Almaty, Kazakhstan
The
importance of Information Risk Management in developing risk management
capability of organisations
Abstract
Due the improvement of the information
technology, the importance of information has heightened enormously. All
valuable assets of enterprises are based on information. From this point, every
organisation has started to focus on managing risks of information leakage. Managing
information risk is essential and problematic. However, the representation of
the Risk Management has enabled different approaches for controlling assets of
companies. This article discusses Information Risk Management techniques and
discusses how standards and policies are important to protect information and
other enterprise assets. In
addition, this paper shows the importance of Information Risk Management for
organisation.
1. Introduction
Risk has been identified
one of the integral part in economy and policy, which has valuable impact on
the development of an organisation. Risk identification helps to the
organisations to avoid future challenges, furthermore, to manage and evaluate
all possible risks. Hopkin and Paul (2013) defined risk as an economical
and financial phenomenon, which have a negative impact on organisations and
companies. Accordingly, most of the enterprises have been attempting to
minimize risk, which caused appearance of the term Risk Management (RM).
Managing risks are
directly related to efficiency and timeliness decision of the problems. RM is
an important component in developing organisation and enterprise structure.
Over the past century, there has been a great attention on risk management structure.
Kenneth et al (1993) found that financial executives considered risk management
as the main issue and it has been taking a great attention from researchers in
finance. In general, RM is about attempting to find best possible solution for problems by preventing from negative
outcomes and minimizing the damage. Another importance of RM within
organisation that diminishing more likelihood outcomes. In general, RM has
enormous impact on organisations and enterprises; it helps to become successful
and to have a defined strategy and tactics to reduce several issues by deeply
organising threats (ibid). For these reasons, RM has been an obligation for
several companies, however, for some regulated sectors, it is not appropriate
choice. Telecommunication, banking, oil industry and insurance, all of them are
example of regulated sectors, which are followed by some identified structure
and tendency (Gupta 2012). Hence, in RM exists processes that characterized as
the process frameworks. Enterprise Risk Management one of the main frameworks
of RM (Lam 2014). It is responsible to set frameworks, policies, methods and
standards and provides risk monitoring (ibid). There has been several methods
and standards of the Enterprise Risk Management. The author of this paper is
more focused on Information Risk Management, which is recognised as the
component of the Enterprise Risk Management. There has been several reasons to
choose Information Risk Management:
-
The
strategy and technics of organisation are based on the information;
-
It has
been assumed that most companies suffering from information leakage,
consequently, taking into account security of information might be significant
for them;
-
Identifying
and preventing security of the information is valuable, in order to have good
strategy considering the level of competitiveness of each organisation;
-
All of
the codes and guides are information based; it proves the necessity of the
information protection.
The major objective of
this paper is to show importance of the Information Risk Management and to
indicate several principles of Information Risk Management to develop
organisationsÕ risk management capability.
2. Understanding Enterprise Risk Management
As it was mentioned above,
Enterprise Risk Management is strategies and methods to manage and manipulate
companies and organisations (Lam 2014). It also provides guide to companies: to
improve plans and enhance companyÕs strategy, to determine gaps in the existing
practices and to find ways to strengthen them (ibid).
Enterprise Risk Management is
applied in strategy setting, intended to define potential risks, which might
occur and can effect to the business structure. Furthermore, it shows how to
manage risks and provide Òreasonable
assurance regarding the achievement of entity objectivesÓ (Moeller, 2007).
Companies which accepted
Enterprise Risk Management have improvements on developing business strategies
and achievements overall. Moreover, by adopting Enterprise Risk Management
framework can lead to reduced losses, enlargement earnings (Lam 2014).
3. The Importance of Information Risk Management
in organisations
Having clearly identified data and information the
organization can create a proper strategy and tactics in order to develop risk
management. The importance of information have heightened due to the confidentiality and competition among organisations.
Information Risk Management considers one of the main aspect and developing
directions in the risk management area.
The risk in
Information Risk Management context is the possible threat that will may exploit system vulnerability and destruction on
information confidentiality and integrity (Carrol 1996), whereas, vulnerability
defines as Òa weakness, holes, flaws which can be exploited by threat and cause
damages in the whole organisationÓ (Stephenson 2004). Taking into consideration
given descriptions, it might to be concluded that risks to information can be
resulted from Òmodification, disclosure, destructionÓ. In order to solve this
issue enterprises should accept Information Risk Management to estimate and
assess risks on information (Hong et al. 2002).
Before
understanding the whole structure of Information Risk Management, it is
important to understand what the word information covers. Information is considered
as a data, which is organized in a significant context (Sutton 2014). Due to
the recent developments in information technologies and increasing number of
hacking attacks have heightened the value and security of the information. The
whole structure and strategy of the business and organisations are based on
information, consequently, managing information risks are defined significant
approach in developing and improving business approaches (ibid). The following
figure shows the informationÕs lifecycle phase.

Figure
1. The Information Lifecycle (Sutton 2014)
The
given figure describes, the process of information; every stage of the
lifecycle requires the information to be protected, hence, it has been seen
that the need of information risk management are compulsory (Sutton 2014).
According
to Sutton (2014) any organisation have at least piece of information, which has
enormous value to the organisation, hence, the Information Risk Management are
needful for them. For example, taking into account departments of the
organisation, Finance department mostly save stores information about profits
and expenditure; IT department attempts to keep it more secure, whereas, Human
Resources hold records about personal information. All these information are
significant for companies and must be protected in order to avoid the
information leakage. As Sutton (2014) described in his book, information risk
is a part of the business risk, which is strongly linked with Òconfidentiality,
integrity and availability of business information assetsÓ.
He
pointed out three basic information principles:
-
Confidentiality (those people who have access can view it);
-
Integrity (those people who have access can modify
information);
-
Availability (information should be available for authorised
people, when they want to have access).
Taking
into consideration these properties of information, it can be clearly seen that
information is the most valuable aspect of the organisation. Protection from
unauthorised access (modification, information loss) might influence to the
development of organisation.
Sutton
(2014) have classified the following risks, which might be resulted in
information risk:
á
Financial loss;
á
Defect on organisation operations;
á
Reputational damage;
á
Legal and regulatory penalties
As
can be clearly seen from previews sections, risk is incidental in companies and
enterprises and failures can cause disasters to the organisation. In addition,
information is critical, moreover, damage on information can cause severe
consequences on developing organisation. Revising all mentioned above,
Information Risk Management is crucial for the organisations and Sutton in his
book Information Risk Management: A
PractitionerÕs Guide examined of the necessity of Information Risk Management
to business strategies. In addition, some benefits from understanding
information risk:
1. Organisation
more likely to have advantages on managing (reducing future risks) comparing
with competitors, which do not follow information risk management;
2. If
unsuspected situations occur, they might have diminished level of impact and
loss;
3. If there is
unexpected events, organisation can recover more quickly and efficiently;
4. Reducing
number of risks and future consequences;
5. Improved
organisation structure (Sutton, 2014).
4. Information Risk Management Structure
Information
security and protection is a crucial to the organisation, accordingly, the
importance of information have been estimating. The best approach of
information prevention is to take Information Risk Management as the main
component of their company and it more likely helps to prevent any negative
outcomes (Pironti 2008). Number of researchers found that processes, procedures
and policies provide effective defence on information rather different software
tools. A large amount of attacks have been committing, hence, this can prove
that technological control framework might not be appropriate to protect
information infrastructure. There has been a view that implementing new
policies and standards could be efficient way of information security. Pironti
(2008) identified Information Risk Management one of the basic areas of
organisationÕs information infrastructure that examines information should be
protected and determines the level of protection. Moreover, Information Risk
Management classifies the value of information and impact on organisationÕs
business strategy.
According
to ISO/IEC Standard Information Risk Management has two approaches: directed on
achievement confidentiality and supporting the level of confidentiality,
integrity and availability (Humphreys 2006). Information Risk Management covers next in information
security aspects:
-
Realization, planning and monitoring of information
security;
-
Provision information security requirements and principles;
-
Provision any hazardous circumstances by the standard and
strategy of risk management;
-
Assurance of personal and staff education relating to
information risks and security;
-
Auditing and rechecking of concepts and security issues (Wheeler 2011)
Sutton
(2014) offered process of information risk management, which consists four key
levels:
1. Identification
and qualification of the risk;
2. Decision-making
process (related to identified risks in the level 1);
3. Applying the
appropriate controls in order to reach the objectives, which is defined in the
level 2;
4. Acceptance of
any risks, which might be found after implementation level 3.
In
addition, Landess (2003) suggested the following steps of Information Risk
Management process:
1. Risk
identification- defining the event, which might occur. This step involves
revealing threats, vulnerabilities of the system;
2. Risk
analysis- assessment and measure of threats and vulnerabilities by
sophistication level and in order to choose appropriate information security
control.
3. Controlling-
using methods, policies and procedures to manage current risk;
4. Monitoring Ð
evaluation of the risks;
5. Report- final
step, which includes decision making process.
In Information Risk Management during risk identification
process the following approaches has done in order to find possible risks:
-
Threat analysis;
-
Vulnerability assessment;
-
Penetration Testing;
-
Auditing (external and internal);
Risk
analysis includes risk assessment, where plans and ideas for information
security are offered in order to
implement any suggestions and solutions. It also analyses deeply any possible
threats and attempts to find the consequences of that issue before identifying
what should be done (Hopkin 2013). During risk assessment organisation examines
threat and vulnerabilities of the information system. After risk assessment
organisation must make decision on risk treatment about prevention, reducing
and acceptance of the threat (Wheeler 2011). Risk communication Òrequires
organisation setting roles, communication procedures and roles for managing
risks, it also reviews risk action plansÓ (Hopkin, 2013). In addition, risk management involves
risk communication, which considers collection of information in order to
identify and classify risks, hindering failure of information security,
reducing risk outcomes, and it includes monitoring and reviewing of the risks
(ibid).
5. Conclusion
Returning
to the main question of the current article, it is now possible to state that
Information Risk Management has significant impact on developing organisation.
Importance of Information Risk Management has considered due to fact that every
organisation has at least piece information. Moreover, that information can be
key structure of business plan or strategy. However, some enterprises do not
pay more attention on information risks. If they have some comprehension of
information risk, in the most cases companies buy software tools in order to
check information security. One of the significant finding showed that
procedures and strategies could be more beneficial rather than different
programs and applications. Taking into consideration this statement, it might
be established that information risk managements should be implemented in each
organisations and companies. In addition, considering the structure of
Information Risk Management, this essay helped to extend understanding
information risk management processes and identified each steps.
6. Reference List
Culp, C. (2001)The Risk Management
Process: Business Strategy and Tactics. 1st edn. United States: Wiley, John
& Sons, Incorporated.
FROOT, K., SCHARFSTEIN, D. and STEIN, J. (1993) ÔRisk Management: Coordinating
Corporate Investment and Financing PoliciesÕ,The Journal of Finance,
48(5), pp. 1629Ð1658. doi: 10.1111/j.1540-6261.1993.tb05123.x.
Gupta, A. (2012)Risk management and simulation. United States: Taylor
& Francis.
Hopkin, P. (2013)Risk Management. United Kingdom: Kogan Page Ltd.
Humphreys, T. (2006) ÔState-of-the-art information security management systems
with ISO/IEC 27001:2005Õ,ISO Management Systems.
Lam, J. (2014)Enterprise Risk Management: From Incentives to Controls.
United States: Wiley.
Landess, D. (2003) ÔA Practical Information Risk Management Process FrameworkÕ,GIAC
Security Essentials.
Moeller, R. (2007)COSO Enterprise Risk Management: Understanding the New
Integrated ENTERPRISE RISK MANAGEMENT Framework. United States: Wiley, John
& Sons, Incorporated.
Pironti, J. (2008) ÔKey Elements of an Information Risk Management Program:
Transforming Information Security Into Information Risk ManagementÕ,I N F O
R M AT I O N S Y S T E M S C O N T R O L J O U R N A L, 2.
Sutton, D. (2014)Information Risk Management: A PractitionerÕs Guide.
United Kingdom: BCS Learning & Development Limited.
Ward, S. (2005)Risk Management Organisation and Content. 1st edn. 32-36
Aylesbury Street: Witherbys.
Wheeler, E. (2011)Security Risk Management: Building an Information Security
Risk Management Program from the Ground Up. Waltham, MA: Elsevier Science.