Combining Disparate Information Sources when Quantifying Security Risks

نویسنده

  • Siv Hilde Houmb
چکیده

Managing risk involves making decision on which risks to treat, what treatment to use and how to finance the treatment. Decision-makers need quantitative values to be able to optimize their investment and to effectively distribute the resources available. Since security attacks are future events we have limited amount of information sources for estimation. In order to quantify frequency of occurrence, impact of incident and effect of alternative treatment options we need to combine empirical and subjective data to obtain a reasonable amount of data. In this paper we present an approach for quantifying security risks using empirical data, such as experience from similar incidents, and subjective data, such as experience and knowledge of domain experts. We look at four different approaches to combine empirical and subjective data by discussing the result from an experiment conducted with undergraduate students at NTNU, Norway. The overall focus of the approaches is on providing support for a cost-benefit analysis for trade-off between risk cost and treatment effect by maximizing the effect of the available resources. However, the main focus of this paper is on studying the effect of using empirical data as input into subjective expert judgments.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Combining Disparate Information Sources when Quantifying Operational Security

Quantitative estimation of security attributes makes it possible to do cost-effective development of security critical systems. By predicting the impact and cost of potential misuses, as well as the cost and effect of security treatment strategies, one can treat security risks at the right time for the correct cost. The Aspect-Oriented Risk-Driven Development (AORDD) framework supports cost-eff...

متن کامل

Users as the Biggest Threats to Security of Health Information Systems

There are a lot of researches in the world about attacks on information systems (IS). Although there have been many attempts to classify threats of IS’s especially in Health Information Systems (HIS), it is still necessary for all health organization to identify new threats and their sources which threaten security of health care domain. The main aim of this paper is to present a research agend...

متن کامل

Towards an Evolvable Cyber Security Protection Profile for Electronic Medical Records to Ensure Privacy and Security

Electronic Medical Records (EMR) provide increased productivity and convenience for patients, doctors, nurses, pharmacists, lab technicians and other medical professionals. The added accessibility to patient information introduces a multitude of security risks at various levels. The communication infrastructure may be breached by intruders from disparate countries. Loosely protected data entry ...

متن کامل

Decision Support Based on the Risk Assessment of Information Systems and Bayesian Learning

Original scientific paper Risk protection has long been one of the main tasks of companies in a wide scope of business. From extensive range of risks the cyber-risks highlight as one of the most important. Cyber-risks are generated from hackers, malicious software, disgruntled employees, competitors, and many other sources both internal and external. Internal and external attacks on corporate a...

متن کامل

Quantifying the Security of Composed Systems

The authors recommend to quantify the security of a complex system by first quantifying the security of its components, and, in a second step, by calculating the overall security according to a given method. This paper summarizes the state of the art of security measures for components and presents a new method for combining these measures into the system’s security. The proposed method starts ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004