Managing complex IT security processes with value based measures

Document Type

Conference Proceeding

Publication Date

1-1-2009

Abstract

Current trends indicate that IT security measures will need to greatly expand to counter the ever increasingly sophisticated, well-funded and/or economically motivated threat space. Traditional risk management approaches provide an effective method for guiding courses of action for assessment, and mitigation investments. However, such approaches no matter how popular demand very detailed knowledge about the IT security domain and the enterprise/cyber architectural context. Typically, the critical nature and/or high stakes require careful consideration and adaptation of a balanced approach that provides reliable and consistent methods for rating vulnerabilities. As reported in earlier works, the Cyberspace Security Econometrics System provides a comprehensive measure of reliability, security and safety of a system that accounts for the criticality of each requirement as a function of one or more stakeholders' interests in that requirement. This paper advocates a dependability measure that acknowledges the aggregate structure of complex system specifications, and accounts for variations by stakeholder, by specification components, and by verification and validation impact. © 2009 IEEE.

Identifier

67650466349 (Scopus)

ISBN

[9781424427697]

Publication Title

2009 IEEE Symposium on Computational Intelligence in Cyber Security Cics 2009 Proceedings

External Full Text Location

https://doi.org/10.1109/CICYBS.2009.4925092

First Page

69

Last Page

75

This document is currently not available here.

Share

COinS