Threat Scenario Dependency-Based Model of Information Security Risk Analysis

被引:0
|
作者
Rahmad, Basuki [1 ]
Supangkat, Suhono H. [2 ]
Sembiring, Jaka [2 ]
Surendro, Kridanto [2 ]
机构
[1] Inst Teknol Bandung, Sch Elect Engn & Informat STEI, Bandung, Indonesia
[2] Inst Teknol Bandung, STEI, Bandung, Indonesia
关键词
Security Risk Analysis; Threat Scenario Dependency; Bayesian Network;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Asset dependency paradigm can help us to represent the phenomena of risk dependency on the relevant assets. This paper is aimed to propose the information security risk analysis model, based on the threat-scenario dependency paradigm to represent the asset dependency. Two current approaches of asset dependency representation, threat dependency and security dimension dependency, still have limitations on consistency and the formulation of control's role to reduce the risk. The proposed model can improve the consistency of threats mapping and the control's roles to reduce the likelihood and degradation value of threat.
引用
收藏
页码:93 / 102
页数:10
相关论文
共 50 条
  • [21] A Threat-Vulnerability Based Risk Analysis Model for Cyber Physical System Security
    Ledwaba, Lehlogonolo
    Venter, H. S.
    PROCEEDINGS OF THE 50TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2017, : 6021 - 6030
  • [22] A security risk analysis model for information systems
    In, HP
    Kim, YG
    Lee, T
    Moon, CJ
    Jung, YJ
    Kim, I
    SYSTEMS MODELING AND SIMULATION: THEORY AND APPLICATIONS, 2005, 3398 : 505 - 513
  • [23] An Enhanced Threat Intelligence Driven Hybrid Model for Information Security Risk Management
    Amin, Habib E. L.
    Samhat, Abed Ellatif
    Chamoun, Maroun
    Oueidat, Lina
    Feghali, Antoine
    PROCEEDINGS 2024 IEEE 25TH INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS, WOWMOM 2024, 2024, : 5 - 12
  • [24] 3 Channel Dependency-Based Power Model for Mobile AMOLED Displays
    Hong, Seongwoo
    Kim, Suk-Won
    Kim, Young-Jin
    PROCEEDINGS OF THE 2017 54TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2017,
  • [25] Information security risk analysis model using information entropy
    Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China
    不详
    Beijing Youdian Daxue Xuebao, 2008, 2 (50-53):
  • [26] An information Security Risk Assessment Method Based on Conduct Effect and Dynamic Threat
    Qiao Hong
    Tian Jianwei
    Tian Zheng
    Qi Wenhui
    Li Xi
    Zhu Hongyu
    Chen Shengsheng
    PROCEEDINGS OF 2017 8TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2017), 2017, : 782 - 786
  • [27] Dependency-Based Semantic Parsing for Concept-Level Text Analysis
    Poria, Soujanya
    Agarwal, Basant
    Gelbukh, Alexander
    Hussain, Amir
    Howard, Newton
    COMPUTATIONAL LINGUISTICS AND INTELLIGENT TEXT PROCESSING, CICLING 2014, PT I, 2014, 8403 : 113 - 127
  • [28] Automated Scoring System Using Dependency-Based Weighted Semantic Similarity Model
    Chen, Liang
    Liu, Yajun
    2009 SECOND INTERNATIONAL SYMPOSIUM ON KNOWLEDGE ACQUISITION AND MODELING: KAM 2009, VOL 1, 2009, : 241 - 244
  • [29] Reliability analysis of risk model metrics based on business approach in information security
    Ibnugraha P.D.
    Nugroho L.E.
    Santosa P.I.
    Ingenierie des Systemes d'Information, 2020, 25 (04): : 475 - 480
  • [30] Online Banking Security Analysis based on STRIDE Threat Model
    Tong Xin
    Ban Xiaofang
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (02): : 271 - 282