This paper presented the process that was taken to define
the ITSRB approach. A comparative analysis of five best
practice frameworks was presented and discussed in section
two of this paper. The objective of presenting the frameworks
was to highlight the key strengths that were used in defining
the ITSRB approach. Section three presented the important
attributes derived from best practice IT security frameworks
discussed in section two of this paper. The objective of section
three was to provide the good attributes as found in various
literatures which would be used as basic principles of the
ITSRB approach. The last section presented the proposed
ITSRB approach, including its structure and features. The
section provides the detail of how the ITSRB approach can be
used for IT security risk management within an organisation