A Multi-criteria Evaluation of Information Security Controls Using Boolean Features
نویسندگان
چکیده
For organizations, the protection of information is of utmost importance. Throughout the years, organizations have experienced numerous system losses which have had a direct impact on their most valuable asset, information. Organizations must therefore find ways to make sure that the appropriate and most effective information security controls are implemented in order to protect their critical or most sensitive classified information. Existing information security control selection methods have been employed in the past, including risk analysis and management, baseline manuals, or random approaches. However, these methods do not take into consideration organization specific constraints such as costs of implementation, scheduling, and availability of resources when determining the best set of controls. In addition, these existing methods may not ensure the inclusion of required/necessary controls or the exclusion of unnecessary controls. This paper proposes a novel approach for evaluating information security controls to help decision-makers select the most effective ones in resource-constrained environments. The proposed approach uses Desirability Functions to quantify the desirability of each information security control taking into account benefits and penalties (restrictions) associated with implementing the control. This provides Management with a measurement that is representative of the overall quality of each information security control based on organizational goals. Through a case study, the approach is proven successful in providing a way for measuring the quality of information security controls (based on multiple application-specific criteria) for specific organizations.
منابع مشابه
Feature Selection Using Multi Objective Genetic Algorithm with Support Vector Machine
Different approaches have been proposed for feature selection to obtain suitable features subset among all features. These methods search feature space for feature subsets which satisfies some criteria or optimizes several objective functions. The objective functions are divided into two main groups: filter and wrapper methods. In filter methods, features subsets are selected due to some measu...
متن کاملGIS-Based Multi Criteria Evaluation for Thermal Power Plant Site Selection in Kahnuj County, SE Iran
Choosing a location for a power plant site is a complex task that involves evaluation of multiple factors, which should satisfy a number of economic and environmental requirements. The main aim of this study is to determine the best possible candidates for thermal power plant sites using Multi-criteria Evaluation and Geographic Information System (GIS) in Kahnuj County in the southeast of Iran....
متن کاملMulti-Criteria Evaluation Model for Desertification Hazard Zonation mapping Using GIS (Study Area: Trouti Watershed, Golestan, Iran)
Desertification is one of the major issues threatening human communities. Manymethods have been developed for assessment and mapping of desertification hazards. In thisresearch, multi-criteria evaluation method was used to investigate desertification process inTrouti watershed, Golestan Province, Iran. At the first step, major desertification factors weredetermined by doing field surveys. They ...
متن کاملA Multi{level Secure Object-oriented Database Model
This model presents a multi-level secure (MLS) database using object-oriented technology. The model is based on, and extends the requirements of the Department of Defense 5200.28-STD, DoD Trusted Computer System Evaluation Criteria (TCSEC) dated December 1985, commonly known as the Orange Book. Currently, there does not exist a database model in any technology which meets the requirements of th...
متن کاملFeature-based Malicious URL and Attack Type Detection Using Multi-class Classification
Nowadays, malicious URLs are the common threat to the businesses, social networks, net-banking etc. Existing approaches have focused on binary detection i.e. either the URL is malicious or benign. Very few literature is found which focused on the detection of malicious URLs and their attack types. Hence, it becomes necessary to know the attack type and adopt an effective countermeasure. This pa...
متن کامل