Intelligence in security countermeasures selection

被引:1
|
作者
Tamjidi, Sina [1 ]
Shameli-Sendi, Alireza [1 ]
机构
[1] Shahid Beheshti Univ SBU, Fac Comp Sci & Engn, Tehran, Iran
关键词
Intelligence; Risk; Vulnerability; Business Process; Countermeasure;
D O I
10.1007/s11416-022-00439-w
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Identifying security risks in organizations and also determining their severity in order to select appropriate security countermeasures is of great importance in organizations. In the last two decades, a lot of work has been done to increase the accuracy of risk impact calculation as well as the right selection of countermeasures. Also, a variety of work has been proposed to select combined countermeasures instead of single ones. So there is a challenge to balance the cost of security with the improvement of the defense system. In this paper, a dataset that includes the organization business processes, security data, assets, vulnerabilities, and related security countermeasures is suggested for the first time. In the previous work, this chain of information from the content of the organization, which is definitely different from another organization, has not been considered for the analysis of the performance of countermeasures (success or failure). Based on the results of the countermeasures during the organization's lifetime, more efficient countermeasures can be suggested for new or existing risks. Therefore, by intelligently selecting the security countermeasures presented in this paper, organizations will be able to identify ineffective countermeasures and prevent them from being re-selected to counter attackers. In this way, we can make our organization more resilient to attackers over time.
引用
收藏
页码:137 / 148
页数:12
相关论文
共 50 条
  • [41] Countermeasures for Maintaining Security of the Cultural Industry
    Liu, Xiaofei
    PROCEEDINGS OF 2015 2ND INTERNATIONAL CONFERENCE ON INDUSTRIAL ECONOMICS SYSTEM AND INDUSTRIAL SECURITY ENGINEERING, 2016, : 285 - 291
  • [42] The security issues and countermeasures in mobile IP
    Wang, HT
    Zheng, SR
    2001 INTERNATIONAL CONFERENCES ON INFO-TECH AND INFO-NET PROCEEDINGS, CONFERENCE A-G: INFO-TECH & INFO-NET: A KEY TO BETTER LIFE, 2001, : E122 - E127
  • [43] Monitoring the Effectiveness of Security Countermeasures in a Security Risk Management Model
    Rjaibi, Neila
    Rabai, Latifa Ben Arfa
    SOFTWARE ENGINEERING IN INTELLIGENT SYSTEMS (CSOC2015), VOL 3, 2015, 349 : 327 - 337
  • [44] Intelligence and security
    Ocqueteau, Frederic
    CHAMP PENAL-PENAL FIELD, 2019, 17
  • [45] Strategic intelligence; Intelligence and the quest for security
    Diaz Matey, Gustavo
    REVISTA UNISCI, 2010, (23): : 243 - 248
  • [46] A Research on Security Awareness and Countermeasures for the Single Server
    Son, Hyuk-Jin
    Jeong, Seungdo
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (06): : 31 - 41
  • [47] JTAG Security Threats: Current Attacks and Countermeasures
    Wang S.
    Kameyama S.
    Takahashi H.
    Wang, Senling (wang@cs.ehime-u.ac.jp), 1600, Japan Institute of Electronics Packaging (24): : 668 - 674
  • [48] On Security Countermeasures Ranking through Threat Analysis
    Nostro, Nicola
    Matteucci, Ilaria
    Ceccarelli, Andrea
    Di Giandomenico, Felicita
    Martinelli, Fabio
    Bondavalli, Andrea
    COMPUTER SAFETY, RELIABILITY, AND SECURITY, 2014, 8696 : 243 - 254
  • [49] Permission based Android security: Issues and countermeasures
    Fang, Zheran
    Han, Weili
    Li, Yingjiu
    COMPUTERS & SECURITY, 2014, 43 : 205 - 218
  • [50] Wireless network security: Vulnerabilities, threats and countermeasures
    Choi, Min-Kyu
    Robles, Rosslin John
    Hong, Chang-Hwa
    Kim, Tai-Hoon
    International Journal of Multimedia and Ubiquitous Engineering, 2008, 3 (03): : 77 - 86