Intelligence in security countermeasures selection

被引:1
|
作者
Tamjidi, Sina [1 ]
Shameli-Sendi, Alireza [1 ]
机构
[1] Shahid Beheshti Univ SBU, Fac Comp Sci & Engn, Tehran, Iran
关键词
Intelligence; Risk; Vulnerability; Business Process; Countermeasure;
D O I
10.1007/s11416-022-00439-w
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Identifying security risks in organizations and also determining their severity in order to select appropriate security countermeasures is of great importance in organizations. In the last two decades, a lot of work has been done to increase the accuracy of risk impact calculation as well as the right selection of countermeasures. Also, a variety of work has been proposed to select combined countermeasures instead of single ones. So there is a challenge to balance the cost of security with the improvement of the defense system. In this paper, a dataset that includes the organization business processes, security data, assets, vulnerabilities, and related security countermeasures is suggested for the first time. In the previous work, this chain of information from the content of the organization, which is definitely different from another organization, has not been considered for the analysis of the performance of countermeasures (success or failure). Based on the results of the countermeasures during the organization's lifetime, more efficient countermeasures can be suggested for new or existing risks. Therefore, by intelligently selecting the security countermeasures presented in this paper, organizations will be able to identify ineffective countermeasures and prevent them from being re-selected to counter attackers. In this way, we can make our organization more resilient to attackers over time.
引用
收藏
页码:137 / 148
页数:12
相关论文
共 50 条
  • [31] A CANVASS ON CYBER SECURITY ATTACKS AND COUNTERMEASURES
    Gupta, Shubhi
    Vashisht, Swati
    Singh, Divya
    2016 1ST INTERNATIONAL CONFERENCE ON INNOVATION AND CHALLENGES IN CYBER SECURITY (ICICCS 2016), 2016, : 31 - 35
  • [32] Security Countermeasures on Ships Sailing in the Fog
    Wu, Chen-Yang
    Dong, Hong-Cang
    Ai, Wan-Zheng
    INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING AND MECHANICAL AUTOMATION (ICEEMA 2015), 2015, : 341 - 345
  • [33] Network Finance Security Problems and Countermeasures
    Feng Danwa
    Hao Wenbin
    Ding Tingxue
    2009 INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2009), VOLUMES 1 AND 2, 2009, : 1289 - +
  • [34] Intelligent method for building security countermeasures
    Kim, Tai-hoon
    Hwang, Sun-myoung
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 2, PROCEEDINGS, 2006, 4252 : 745 - 750
  • [35] On the Effectiveness of Security Countermeasures for Critical Infrastructures
    Hausken, Kjell
    He, Fei
    RISK ANALYSIS, 2016, 36 (04) : 711 - 726
  • [36] Security in Edge Blockchains:Attacks and Countermeasures
    CAO Yinfeng
    CAO Jiannong
    WANG Yuqin
    WANG Kaile
    LIU Xun
    ZTE Communications, 2022, 20 (04) : 3 - 14
  • [37] Design procedure of IT systems security countermeasures
    Kim, TH
    Lee, SY
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2005, PT 2, 2005, 3481 : 468 - 473
  • [38] Security Issue and Countermeasures of Campus Network
    Zhang Lin
    Wang Ning
    2016 8TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY IN MEDICINE AND EDUCATION (ITME), 2016, : 741 - 743
  • [39] COMPUTER SECURITY - THREATS, VULNERABILITIES AND COUNTERMEASURES
    SMITH, M
    INFORMATION AGE, 1989, 11 (04): : 205 - 210
  • [40] The Analysis and Countermeasures on Security Breach of Bitcoin
    Lim, Il-Kwon
    Kim, Young-Hyuk
    Lee, Jae-Gwang
    Lee, Jae-Pil
    Nam-Gung, Hyun
    Lee, Jae-Kwang
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2014, PT IV, 2014, 8582 : 720 - 732