Threat Scenario Dependency-Based Model of Information Security Risk Analysis

被引:0
|
作者
Rahmad, Basuki [1 ]
Supangkat, Suhono H. [2 ]
Sembiring, Jaka [2 ]
Surendro, Kridanto [2 ]
机构
[1] Inst Teknol Bandung, Sch Elect Engn & Informat STEI, Bandung, Indonesia
[2] Inst Teknol Bandung, STEI, Bandung, Indonesia
关键词
Security Risk Analysis; Threat Scenario Dependency; Bayesian Network;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Asset dependency paradigm can help us to represent the phenomena of risk dependency on the relevant assets. This paper is aimed to propose the information security risk analysis model, based on the threat-scenario dependency paradigm to represent the asset dependency. Two current approaches of asset dependency representation, threat dependency and security dimension dependency, still have limitations on consistency and the formulation of control's role to reduce the risk. The proposed model can improve the consistency of threats mapping and the control's roles to reduce the likelihood and degradation value of threat.
引用
收藏
页码:93 / 102
页数:10
相关论文
共 50 条
  • [1] Constructing a Risk Dependency-based Availability Model
    Tsai, Dwen-Ren
    Sang, Hui-An
    44TH ANNUAL 2010 IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, 2010, : 218 - 220
  • [2] Fuzzy risk assessment of information security threat scenario
    Ge, Hai-Hui
    Zheng, Shi-Hui
    Chen, Tian-Ping
    Yang, Yi-Xian
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2013, 36 (06): : 89 - 92
  • [3] Dependency-based security risk assessment for cyber-physical systems
    Aida Akbarzadeh
    Sokratis K. Katsikas
    International Journal of Information Security, 2023, 22 : 563 - 578
  • [4] Dependency-based security risk assessment for cyber-physical systems
    Akbarzadeh, Aida
    Katsikas, Sokratis K.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 22 (03) : 563 - 578
  • [5] Threat scenario-based security risk analysis using use case modeling in information systems
    Kim, Young-Gab
    Cha, Sungdeok
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (03) : 293 - 300
  • [6] Dependency-based analysis for Tagalog sentences
    Manguilimotan, Erlyn
    Matsumoto, Yuji
    PACLIC 25 - Proceedings of the 25th Pacific Asia Conference on Language, Information and Computation, 2011, : 343 - 352
  • [7] A Dependency analysis for Information Security and Risk Management
    Krishna, B. Chaitanya
    Subrahmanyam, Kodukula
    Kim, Tai-hoon
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (08): : 205 - 210
  • [8] A Dependency-based Combinatorial Approach for Reducing Effort for Scenario-based Safety Analysis of Autonomous Vehicles
    Madala, Kaushik
    Do, Hyunsook
    Avalos-Gonzalez, Carlos
    PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON VEHICLE TECHNOLOGY AND INTELLIGENT TRANSPORT SYSTEMS (VEHITS), 2021, : 235 - 246
  • [9] Dependency-based Risk Evaluation for Robust Workflow Scheduling
    Wang, Mingzhong
    Ramamohanarao, Kotagiri
    Chen, Jinjun
    2012 IEEE 26TH INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM WORKSHOPS & PHD FORUM (IPDPSW), 2012, : 2328 - 2335
  • [10] Dependency-based FMEA model for product risk analysis: a case study of a switch mode power supply
    Liou, James J. H.
    Liu, Perry C. Y.
    Lo, Huai-Wei
    INTERNATIONAL JOURNAL OF INTERACTIVE DESIGN AND MANUFACTURING - IJIDEM, 2024, 18 (07): : 5225 - 5242