Skip to main content

Business Driven ICT Risk Management in the Banking Domain with RACOMAT

  • Conference paper
  • First Online:
Risk Assessment and Risk-Driven Quality Assurance (RISK 2016)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 10224))

Included in the following conference series:

Abstract

Bringing business risk management and technical security risk management together is one of the major challenges banks currently struggle with in order to increase their resilience against cyber security threats. This short paper presents a systematic approach for such an integrated security risk management which is currently developed in cooperation with a system-relevant bank. The approach uses well known methods and existing standards, it takes advantage of knowledge databases and available generic domain specific models. A first case study has just started. With tool support and especially with a high level of automation the presented approach might become applicable even for large banks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Lund, M.S., Solhaug, B., Stølen, K.: Model-Driven Risk Analysis – The CORAS Approach. Springer, Heidelberg (2011)

    Book  MATH  Google Scholar 

  2. International Standards Organization: ISO 31000:2009(E), Risk management – Principles and guidelines (2009)

    Google Scholar 

  3. BIAN e.V.: The BIAN Service Landscape Version 4.5, Frankfurt am Main (2016)

    Google Scholar 

  4. Tjoa, S.: A formal approach enabling risk-aware business process modeling and simulation. IEEE Trans. Serv. Comput. 4, 153–166 (2011). doi:10.1109/TSC.2010.17

    Article  Google Scholar 

  5. Viehmann, J., Werner, F.: Risk assessment and security testing of large scale networked systems with RACOMAT. In: Seehusen, F., Felderer, M., Großmann, J., Wendland, M.-F. (eds.) RISK 2015. LNCS, vol. 9488, pp. 3–17. Springer, Cham (2015). doi:10.1007/978-3-319-26416-5_1

    Chapter  Google Scholar 

  6. Bouti, A., Kadi, D.A.: A state-of-the-art review of FMEA/FMECA. Int. J. Reliab. Qual. Saf. Eng. 1, 515–543 (1994)

    Article  Google Scholar 

  7. International Electrotechnical Commission: IEC 61025 Fault Tree Analysis (FTA) (1990)

    Google Scholar 

  8. International Electrotechnical Commission: IEC 60300-3-9 Dependability management – Part 3: Application guide – Section 9: Risk analysis of technological systems – Event Tree Analysis (ETA) (1995)

    Google Scholar 

  9. Rackham, G.: 2015. Banking Industry Architecture Network BIAN - How-to Guide v4: Applying the BIAN Standard, Frankfurt am Main (2016). https://bian.org/assets/bian-standards/bian-service-landscape-4-0/. Accessed 21 Mar 2016

  10. Basel Committee on Banking Supervision 2016: Compilation of documents that form the global regulatory framework for capital and liquidity. https://www.bis.org/bcbs/basel3/compilation.htm. Accessed 30 Dec 2016

  11. Kreditwesengesetz in der Fassung der Bekanntmachung vom 9. September 1998 (BGBl. I S. 2776), das durch Artikel 5 des Gesetzes vom 23. Dezember 2016 (BGBl. I S. 3171) geändert worden ist. https://www.gesetze-im-internet.de/kredwg/BJNR008810961.html. Accessed 30 Dec 2016

  12. Mock, R., Corvo, M.: Risk analysis of information systems by event process chains. Int. J. Crit. Infrastruct. 1, 247 (2005). doi:10.1504/IJCIS.2005.006121

    Article  Google Scholar 

  13. Gjære, E.A., Meland, P.H.: Threats management throughout the software service life-cycle. Electron. Proc. Theor. Comput. Sci. 148, 1–14 (2014). doi:10.4204/EPTCS.148.1

    Article  Google Scholar 

  14. Jakoubi, S., Tjoa, S., Quirchmayr, G.: Rope: a methodology for enabling the risk-aware modelling and simulation of business processes. Presented at the ECIS 2007, AIS (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Johannes Viehmann .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Viehmann, J. (2017). Business Driven ICT Risk Management in the Banking Domain with RACOMAT. In: Großmann, J., Felderer, M., Seehusen, F. (eds) Risk Assessment and Risk-Driven Quality Assurance. RISK 2016. Lecture Notes in Computer Science(), vol 10224. Springer, Cham. https://doi.org/10.1007/978-3-319-57858-3_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-57858-3_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-57857-6

  • Online ISBN: 978-3-319-57858-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics