Javascript must be enabled to continue!
Strengthening information technology security through the failure modes and effects analysis approach
View through CrossRef
AbstractProper protection of information systems is a major quality issue of organizational risk management. Risk management is a process whereby risk factors are identified and then virtually eliminated. Failure modes and effects analysis (FMEA) is a risk management methodology for identifying system’s failure modes with their effects and causes. FMEA identifies potential weaknesses in the system. This approach allows companies to correct areas identified through the process before the system fails. In this paper, we identify several critical failure factors that may jeopardize the security of information systems. In doing this, we systematically identify, analyze, and document the possible failure modes and the possible effects of each failure on the system. The proposed cybersecurity FMEA (C-FMEA) process results in a detailed description of how failures influence the system’s performance and how they can be avoided. The applicability of the proposed C-FMEA is illustrated with an example from a regional airport.
Springer Science and Business Media LLC
Title: Strengthening information technology security through the failure modes and effects analysis approach
Description:
AbstractProper protection of information systems is a major quality issue of organizational risk management.
Risk management is a process whereby risk factors are identified and then virtually eliminated.
Failure modes and effects analysis (FMEA) is a risk management methodology for identifying system’s failure modes with their effects and causes.
FMEA identifies potential weaknesses in the system.
This approach allows companies to correct areas identified through the process before the system fails.
In this paper, we identify several critical failure factors that may jeopardize the security of information systems.
In doing this, we systematically identify, analyze, and document the possible failure modes and the possible effects of each failure on the system.
The proposed cybersecurity FMEA (C-FMEA) process results in a detailed description of how failures influence the system’s performance and how they can be avoided.
The applicability of the proposed C-FMEA is illustrated with an example from a regional airport.
Related Results
[RETRACTED] Keanu Reeves CBD Gummies v1
[RETRACTED] Keanu Reeves CBD Gummies v1
[RETRACTED]Keanu Reeves CBD Gummies ==❱❱ Huge Discounts:[HURRY UP ] Absolute Keanu Reeves CBD Gummies (Available)Order Online Only!! ❰❰= https://www.facebook.com/Keanu-Reeves-CBD-G...
Cash‐based approaches in humanitarian emergencies: a systematic review
Cash‐based approaches in humanitarian emergencies: a systematic review
This Campbell systematic review examines the effectiveness, efficiency and implementation of cash transfers in humanitarian settings. The review summarises evidence from five studi...
Public budget security administration: development of primary mechanisms
Public budget security administration: development of primary mechanisms
The current state of public administration of budget security indicates its actual absence. With the extremely important role of budget security, both in the life of the country as...
Research on the deformation and failure mode of rock slope with multiple locking segment failure characteristics
Research on the deformation and failure mode of rock slope with multiple locking segment failure characteristics
Abstract
Landslides are the most critical types of geological disasters in China, seriously threatening the safety of life and property of the inhabitants in the sur...
Circular Economy: Rethinking Security Sustainability Through Ransom Project
Circular Economy: Rethinking Security Sustainability Through Ransom Project
Abstract
As part of PETRONAS approach to sustainability, the organization has made more concerted effort to purposefully adopt Circular Economy (CE) across PETRONAS ...
Security as controversy: Reassembling security at Amsterdam Airport
Security as controversy: Reassembling security at Amsterdam Airport
Abstract
Critical approaches to security have come to define themselves against mainstream security studies by not a priori assuming what security is, but rather ...
THE SECURITY AND PRIVACY MEASURING SYSTEM FOR THE INTERNET OF THINGS DEVICES
THE SECURITY AND PRIVACY MEASURING SYSTEM FOR THE INTERNET OF THINGS DEVICES
The purpose of the article: elimination of the gap in existing need in the set of clear and objective security and privacy metrics for the IoT devices users and manufacturers and a...
SECURITY REQUIREMENTS VALIDATION FOR MOBILE APPS: A SYSTEMATIC LITERATURE REVIEW
SECURITY REQUIREMENTS VALIDATION FOR MOBILE APPS: A SYSTEMATIC LITERATURE REVIEW
Security requirements are important to increase the confidence of mobile users to perform many online transactions, such as banking, booking and payment via mobile devices. Object...

