Attack Tree Based Information Security Risk Assessment Method Integrating Enterprise Objectives with Vulnerabilities

被引:0
|
作者
Karabey, Bugra [1 ]
Baykal, Nazife [1 ]
机构
[1] Middle E Tech Univ, Inst Informat, Ankara, Turkey
关键词
Enterprise information security; enterprise modelling; risk assessment; risk assessment method; resource based view; attack trees; risk management; DESIGN; SCIENCE;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In order to perform the analysis and mitigation efforts related with the information security risks there exists quantitative and qualitative approaches, but the most critical shortcoming of these methods is the fact that the outcome mainly addresses the needs and priorities of the technical community rather than the management. For the enterprise management, this information is essentially required as a decision making aid for the asset allocation and the prioritization of mitigation efforts, so, ideally the outcome of an information security risk method must be in synchronization with the enterprise objectives to act as a useful decision tool for the management. also, in the modelling of the threat domain, attack trees are frequently utilized However the execution of attack tree modelling is costly from the effort and timing requirements and also, has inherent scalability issues. so, within this article our design-science research based work on an information security risk assessment method that addresses these two issues of enterprise objective inclusion and model scalability will be outlined
引用
收藏
页码:297 / 304
页数:8
相关论文
共 50 条
  • [1] Security risk metrics: Fusing enterprise objectives and vulnerabilities
    Clark, K
    Dawkins, J
    HAle, J
    Proceedings from the Sixth Annual IEEE Systems, Man and Cybernetics Information Assurance Workshop, 2005, : 388 - 393
  • [2] Overview of Enterprise Information Needs in Information Security Risk Assessment
    Korman, Matus
    Ekstedt, Mathias
    Sommestad, Teodor
    Hallberg, Jonas
    Bengtsson, Johan
    PROCEEDINGS OF THE 2014 IEEE 18TH INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE (EDOC 2014), 2014, : 42 - 51
  • [3] Risk Assessment Method of Information Security Based on AHP
    Ning, Xu
    PROCEEDINGS OF 2010 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND INDUSTRIAL ENGINEERING, VOLS I AND II, 2010, : 430 - 433
  • [4] A Formal Methodology for Enterprise Information Security Risk Assessment
    Bhattacharjee, Jaya
    Sengupta, Anirban
    Mazumdar, Chandan
    2013 INTERNATIONAL CONFERENCE ON RISKS AND SECURITY OF INTERNET AND SYSTEMS (CRISIS), 2013,
  • [5] Information Security Risk Assessment Method for Ship Control System Based on Fuzzy Sets and Attack Trees
    Shang, Wenli
    Gong, Tianyu
    Chen, Chunyu
    Hou, Jing
    Zeng, Peng
    SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [6] Risk Assessment of Security Requirements of Banking Information Systems Based on Attack Patterns
    Rongrat, Krissada
    Senivongse, Twittie
    APPLIED COMPUTING & INFORMATION TECHNOLOGY, 2018, 727 : 117 - 133
  • [7] Risk assessment method of power plant industrial control information security based on Bayesian attack graph Systems
    Xie, Jianbo
    Sun, Keda
    Lei, Xubing
    JOURNAL OF ELECTRICAL SYSTEMS, 2021, 17 (04) : 529 - 541
  • [8] The Research of Information Security Risk Assessment Method Based on AHP
    Xu, Ning
    Zhao, DongMei
    SPORTS MATERIALS, MODELLING AND SIMULATION, 2011, 187 : 575 - 580
  • [9] A Fuzzy Logic based Information Security Risk Assessment Method
    Yang, Yaling
    Zhou, Yanhui
    MECHANICAL AND ELECTRONICS ENGINEERING III, PTS 1-5, 2012, 130-134 : 3726 - 3730
  • [10] Network Security Risk Assessment Method Based on HMM and Attack Graph Model
    Liu Si-chao
    Liu Yuan
    2016 17TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 2016, : 517 - 522