1. Risk Management in Service Computing
-
Upload
calabria25 -
Category
Documents
-
view
216 -
download
3
Transcript of 1. Risk Management in Service Computing
-
Risk Management in Service Computing
Security and Risk ManagementSummer Term 2014
Prof. Dr. Dr. h.c. Gnter Mller
Institute of Computer Science and Social Studies - Department of Telematics
Dipl.-Vwirt. Arnt Syring, M.Sc. Christian Brenig
-
Security and Risk Management | Risk Management in Service Computing 2
Agenda
Impact of Information on Business
Service ComputingServicesEconomics of Web 2.0Economics of Cloud Computing
Risks in Service ComputingTechnical Vulnerabilities Business Vulnerabilities
IT GovernanceIT Alignment IT Security IT ComplianceIT Risk Management
A
B
C
D
-
Security and Risk Management | Risk Management in Service Computing
R. Kerviel
Societe General
4 900 000 000
Societal Risks (1/2)
3
-
Security and Risk Management | Risk Management in Service Computing
Societal Risks (2/2)
4
-
Security and Risk Management | Risk Management in Service Computing
New Business: Business with Data
An right control, edit, manage, and delete
information about them[selves] and decide when, how, and to
what extent information is communicated to others.
5
-
Security and Risk Management | Risk Management in Service Computing
Business Model: Data Collection
Data Protection Principles
1. Agreement
2. Necessity
3. Purpose
4. Transparency
5. Control and Audit
6
Data provider
=
Regular consumer
Data Consumer
=
Business
Data-
consumer
Data-
provider
-
Security and Risk Management | Risk Management in Service Computing
New Business: Data CentricServices
7
Collecting unrelated data How do you want to
appear to your friends
How do you live?
65% Targeted avertising
25% Consumer surplus
5% Service Composition
5% Inferences
Where are you?
-
Security and Risk Management | Risk Management in Service Computing
Next to labor, land and capital, information is the fourth production factor for the modern company.
Labor Land
Capital Information
Company
Electronical Distribution Channelse.g.
Growing complexity
Local and global cross linking
Technological change
Abuse
ambition
e.g.
Detraction of business processes
Deviation or manipulation of transactions
Theft of customer and enterprise data
e.g.
Online Banking, Portals
External hosting, RAS
Communication (e-mail)
Information andRisks
8