A Comparison of Security Safeguard Selection Methods
نویسنده
چکیده
IT security incidents pose a major threat to the efficient execution of corporate strategies and business processes. Although companies generally spend a lot of money on security companies are often not aware of their spending on security and even more important if these investments into security are effective. This paper provides decision makers with an overview of decision support techniques, describes pros and cons of these
منابع مشابه
Automated Safeguard Selection Strategies
The goal-oriented security process helps to alleviate risks associated with security and other continuity goals such as scalability, availability, reliability and compliance. System assets, threats, and potential safeguards are modeled in a goal tree to show the likelihood and impact of individual threats and the efficacy of safeguards to protect against them. This paper describes the process o...
متن کاملA Review of the Performance of the International Atomic Energy Agency Regarding Pakistan’s Nuclear Activities
Among the significant issues of the subcontinental region, one can refer to the concern over Pakistan’s inability to maintain the security of its nuclear facilities, the illegal increase in its nuclear weapon production, extremist organizations’ access to nuclear weapons, as well as the fact that this country has not joined the NPT treaty. Meanwhile, the International Atomic Energy Agency (IAEA...
متن کاملA Parallel Genetic Algorithm Based Method for Feature Subset Selection in Intrusion Detection Systems
Intrusion detection systems are designed to provide security in computer networks, so that if the attacker crosses other security devices, they can detect and prevent the attack process. One of the most essential challenges in designing these systems is the so called curse of dimensionality. Therefore, in order to obtain satisfactory performance in these systems we have to take advantage of app...
متن کاملA Parallel Genetic Algorithm Based Method for Feature Subset Selection in Intrusion Detection Systems
Intrusion detection systems are designed to provide security in computer networks, so that if the attacker crosses other security devices, they can detect and prevent the attack process. One of the most essential challenges in designing these systems is the so called curse of dimensionality. Therefore, in order to obtain satisfactory performance in these systems we have to take advantage of app...
متن کاملWorkshop-based Security Safeguard Selection with AURUM
Organizations are increasingly exposed to manifold threats concerning the security of their valuable business processes. Due to the increasing damage potential, decision makers are permanently forced to pay attention to security issues and are raising their security investments, but often (i) without considering the efficiency of the investments made, (ii) neglecting to involve people in order ...
متن کامل