Security Ontology for Adaptive Mapping of Security Standards
نویسندگان
چکیده
Adoption of security standards has the capability of improving the security level in an organization as well as to provide additional benefits and possibilities to the organization. However mapping of used standards has to be done when more than one security standard is employed in order to prevent redundant activities, not optimal resource management and unnecessary outlays. Employment of security ontology to map different standards can reduce the mapping complexity however the choice of security ontology is of high importance and there are no analyses on security ontology suitability for adaptive standards mapping. In this paper we analyze existing security ontologies by comparing their general properties, OntoMetric factors and ability to cover different security standards. As none of the analysed security ontologies were able to cover more than 1/3 of security standards, we proposed a new security ontology, which increased coverage of security standards compared to the existing ontologies and has a better branching and depth properties for ontology visualization purposes. During this research we mapped 4 security standards (ISO 27001, PCI DSS, ISSA 5173 and NISTIR 7621) to the new security ontology, therefore this ontology and mapping data can be used for adaptive mapping of any set of these security standards to optimize usage of multiple security standards in an organization.
منابع مشابه
Ontology-Based Security Standards Mapping Optimization by the Means of Graph Theory
standards can be required by regulating institutions. While security standards can differ in purpose and covered area, more than one standard can be used at the same time which leads to overlap and potential conflicts in requirements of different standards. In such cases, deep analysis of used standards has to be done to ensure optimal usage of company’s resources implementing these security re...
متن کاملTowards an Ontology-Driven Approach for the Interoperability Problem in Security Compliance
In today’s IT-centric, regulated and competitive environment, businesses rely more heavily on IT technologies. Organizations are often challenged by customers, business partners and legal entities to demonstrate their compliance to different IT security and performance standards. The existence of heterogeneous standards and regulations raises the interoperability problem for organizations havin...
متن کاملOntological Mapping of Information Security Best-Practice Guidelines
Due to a rapid growth in the use of electronic data processing and networking, an information security management system with a holistic and widespread view becomes more and more important for any kind of organization. The fundamental challenge for such systems is the representation and management of information security knowledge. While information security ontologies already exist, no methods...
متن کاملMapping of McGraw Cycle to RUP Methodology for Secure Software Developing
Designing a secure software is one of the major phases in developing a robust software. The McGraw life cycle, as one of the well-known software security development approaches, implements different touch points as a collection of software security practices. Each touch point includes explicit instructions for applying security in terms of design, coding, measurement, and maintenance of softwar...
متن کاملToward an Ontology Architecture for Cyber-Security Standards
The rapid growth in magnitude and complexity of cyber-security information and event management (CSIEM) has ignited a trend toward security automation and information exchange standards. Making Security Measurable (MSM) references a collection of open community standards for the common enumeration, expression and reporting of cyber-security-related information. While MSM-related standards are v...
متن کامل