REVISÃO DE PADRÕES RELEVANTES E LITERATURA DE GESTÃO DE RISCOS E CONTROLES EM SISTEMAS DE INFORMAÇÃO (publicado em espanhol)

Autores

  • Marlene Lucila Guerrero Julio Profesora Asociada, Universidad Pontificia Bolivariana, Colombia.
  • Luis Carlos Gómez Flórez Profesor titular, Universidad Industrial de Santander, Colombia.

DOI:

https://doi.org/10.1016/S0123-5923(11)70188-7

Palavras-chave:

Padrão, gestão de riscos e controles, nível de risco, sistemas de informação

Resumo

A gestão de riscos e controles em sistemas de informação (GRCSI) é uma atividade importante nos sistemas de gestão. No entanto, apesar de que nas organizações parece haver interesse em sua aplicação, a GRCSI ainda não atingiu o impacto desejado, devido em grande parte a falta de compreensão de seu sentido ou propósito e a ausência dos processos de mudança organizacional necessários a sua implantação. Este artigo apresenta uma revisão dos padrões mais relevantes da GRCSI, com o objetivo de apresentar uma proposta de integração das funções e as atividades que as organizações devem desenvolver, e de analisar os níveis de risco e suas implicações perante os sistemas de informação.

Downloads

Os dados de download ainda não estão disponíveis.

Referências

Alberts, C., Behrens, S., Pethia, R. y Wilson, W. (1999). Operationally critical threat, asset, and vulnerability evaluations (OCTAVESM) framework, Version 1.0. TECHNICAL REPORT. CMU/SEI-99- TR-017. ESC-TR-99-017. Carnegie Mellon, SEE.

Ashenden, D. (2008). Information security management: A human challenge? Proceeding of Information Security Technical Report, 13(4), 195-201.

Ashenden, D. y Ezingeard, J.N. (2005). The need for a sociological approach to information security risk management. Documento no publicado, presentado en la 4th Annual Security Conference, Las Vegas, Nevada, Estados Unidos.

AS/NZS 4360:2004. (2004). Estándar Australiano. Administración de Riesgos (3 ed.). Sydney: Standards Australia International.

Baskerville, R. (1993). Information systems security design methods: Implications for information systems development. ACM Computing Surveys, 25(4), 375-414.

Blakley, B., McDermott, E. y Geer, D. (2001). Information security is information risk management. In NSPW -01 Proceedings of the 2001 workshop on new security paradigms (pp. 97-104). New York, NY: ACM.

Boehm, B.W. (1991). Software risk management: principles and practice. IEEE Software, 8(1), 32-41.

Cano, J. (2009). Monitoreo y evolución de la seguridad de la información. Revista ACIS, 110, 4-13.

Castilla, M., Herrera, L., Llanes, E. y Sánchez, D. (2004). Estudio de riesgos y controles del sistema de información de la Biblioteca Germán Bula Meyer. Recuperado el 25 de mayo de 2009, de http://www.scribd.com/doc/16445970/Riesgos-y-ControlProteccion-de-Datos-Biblioteca-GBM

Checkland, P. (2000). Systems thinking, systems practice. Includes a 30-year retrospective. New York, NY: John Wiley & Sons.

Checkland P. y Holwell, S. (1998). Information, systems and information systems: making sense of the field. New York, NY: John Wiley & Sons.

Checkland P. y Poulter, J. (2006). Learning for action. A short definitive account of soft systems methodology and its use for practitioners, teachers and students. New York, NY: John Wiley & Sons.

Checkland, P. y Scholes, J. (1999a). Information, Systems, and Information Systems. Cybernetics and humans knowing, 6(3), 91-95.

Checkland, P. y Scholes, J. (1999b). Soft system methodology in action. New York, NY: John Wiley & Sons.

Checkland, P. y Scholes, J. (2000). Soft systems methodology in action: a thirty year retrospective. System research and behavioral science, 17, S11-S58.

Chittister, C. y Haimes, Y.Y. (1993). Risks associated with software development: a holistic framework for assessment and management. IEEE Transactions on Systems, Man and Cybernetics, 23(3), 710-723.

Clusif, M. (2007). Guide de l analyse des risques. Recuperado el 11 de diciembre de 2009, de http://www.clusif.asso.fr

Contraloría General de la República de Nicaragua -CGRN. (1995). Normas técnicas de control interno para el sector público. Recuperado el 18 de abril de 2009, de http://legislacion.asamblea.gob.ni/normaweb.nsf/%28$All%29/804DEAE046418EEB062571790058C3B5?OpenDocument

Elissondo, L. (2008). Auditoria y Seguridad de Sistemas de Información. Recuperado el 8 de noviembre de 2011, de http://econ.unicen.edu.ar/monitorit/index.php?option=com_docman&task=doc_download&gid=175&Itemid=19

Fairley, R. (1994). Risk management for software projects. IEEE Software, 11(3), 57-67.

Farahmand, F., Navathe, S. y Enslow, P. (2003). Managing vulnerabilities of information systems to security incidents. Documento no publicado, presentado en The 5th International Conference on Electronic Commerce, Pittsburgh, PA, Estados Unidos. Recuperado de http://portal.acm.org/citation.cfm?id=948050

García, J. y Martínez, C. (2008). Análisis y control de riesgos de seguridad informática: control adaptativo un cambio de paradigma hacia la gestión de riesgos orientada al control adaptativo. Revista Sistemas ACIS, 105. Recuperado de http://www.acis.org.co/fileadmin/Revista_105/JMGarcia.pdf

Guerrero, M. (2010). Gestión de riesgos y controles en sistemas de información. Tesis de Maestría no publicada, Universidad Industrial de Santander, Bucaramanga, Colombia.

Haig, B. (2009). Man in the Middle. New York, NY: Grand Central Publishing.

Harold, F. y Tipton, M.K. (Eds.). (2006). Information Security Management Handbook (5a ed.). Danver, MA: CRC Press.

Hirsch, C. y Ezingeard, J.N. (2008). Perceptual and cultural aspects of risk management alignment: a case study. Journal of Information System Security, 4(1), 1551-0123.

ISACA. (2002). Documento S11. Recuperado el 19 de junio de 2009, de http://www.isaca.org

ISM3 Consortium. (2009). Information security management maturity model. Versión 2.0. Madrid, España.

ISO. (2005). ISO/IEC 27001:2005(E) Information technology - Security techniques - Information security management systems - Requirements. Londres: International Organization for Standardization and International Electrotechnical Commission.

ISO. (2008) Introduction to ISO 27005 (ISO27005). ICONTEC.

Landoll, D. (2005). The security risk assessment handbook: A complete guide for performing security risk assessments. Boca Raton, FL: Auerbach.

Laudon, K. y Laudon, J. (2008). Sistemas de información gerencial(10 ed.). México: Prentice Hall.

Leon, N. y Gomez, L.C. (2010). Propuesta de un modelo para la evaluación de calidad de productos software utilizados como apoyo a la biomedicina. Bucaramanga: Vicerrectoria de Investigación y Extensión, Universidad Industrial de Santander.

McFadzean, E., Ezineard, J.N. y Birchall, D. (2007). Perception of risk and the strategic impact of existing IT on Information Security strategy at board level. Online Information Review, 31(5), 622-660.

McLeod, R. (2000). Sistemas de información gerencial (7 ed.). México: Prentice Hall.

Ministerio de Administraciones Públicas. (1997). MAGUERIT. Metodología de Análisis y Gestión de Riesgos de los sistemas de información. España: Autores.

Norma RFC4949. (2007). Internet Security Glossary, Version 2. Recuperado el 24 de febrero de 2010, de http://www.ietf.org/rfc/rfc4949.

Norton, R. (2004). Crooked managers. Changing technology. Financial surprises. Who knows what company-killers lie ahead? Here's how directors can protect themselves. Institute of Public Administration of Canada. Toronto: Longwoods Publishing Corporation.

Peltier, T. (2001). Information security risk analysis. Boca Raton, FL: Auerbach Publications.

PriceWaterhouseCoopers. (2004). Managing risk: An assessment of CEO preparedness. Recuperado de http://www.pwc.com.

Ribagorda, A. (1997). Glosario de términos de seguridad de las T.I. Madrid: CODA.

Ross, R., Katzke, S., Johnson, A., Swanson, M. y Stoneburner, G. (2008). Managing risk from information systems an organizational perspective, Special Publication 800-839. Gaithersburg, MD: U.S. Dept. of Commerce, National Institute of Standards and Technology.

Schein, E.H. (1991) Psicología de la Organización. México: Prentice-Hall.

Silberfich, P.A. (2009). Análisis y Gestión de riesgos en TI ISO 27005 Aplicación Práctica. Documento no publicado presentado en el Quinto Congreso Argentino de Seguridad de la Información, Argentina.

Singh, S. y Brewer, R. (2008). The evolution of risk and controls from score-keeping to strategic partnering. KPGM International. Recuperado el 18 de diciembre de 2009, de http://sociedaddelainformacion.wordpress.com/category/seguridad/gestion-de-riesgos/

Smith, H., McKeen, J. y Staples D. (2001). Risk management in information systems: Problems and potential. Communications of the Association for Information Systems, 7(13).

SOMAP. (2006). Open Information Security Risk Management Handbook. Versión 1.0. Recuperado el 15 de diciembre de 2009, de http://ufpr.dl.sourceforge.net/project/somap/Infosec%20Risk%20Mgmt%20Handbook/Version%201.0/somap_handbook_v1.0.0.pdf

Stonebumer, G., Coguen, A. y Feringa, A. (2002). Risk Management Guide for Managing risk from information systems an organizational perspective, Special Publication 800-830. Gaithersburg, MD: U.S. Dept. of Commerce, National Institute of Standards and Technology.

Straub, D. y Welke, R. (1998). Coping with systems risk: Security planning models for management decision making. MIS Quarterly, 22(4), 441-469.

TCSEC - Trusted Computer Systems Evaluation Criteria, DoD 5200.28-STD, Department of Defense, United States of America, 1985.

Wah, L. (1998). The risky business of managing IT risks. Management Review, 87(5), 6.

Whitman, M. y Mattord, H. (2005). Principles of information security (2a ed.). Boston, MA: Thomson Course Technology.

Publicado

2011-12-31

Edição

Seção

Artigos de pesquisa

Como Citar

REVISÃO DE PADRÕES RELEVANTES E LITERATURA DE GESTÃO DE RISCOS E CONTROLES EM SISTEMAS DE INFORMAÇÃO (publicado em espanhol). (2011). Estudios Gerenciales, 27(121), 195-218. https://doi.org/10.1016/S0123-5923(11)70188-7