Managing complex IT security processes with value based measures
Document Type
Conference Proceeding
Publication Date
1-1-2009
Abstract
Current trends indicate that IT security measures will need to greatly expand to counter the ever increasingly sophisticated, well-funded and/or economically motivated threat space. Traditional risk management approaches provide an effective method for guiding courses of action for assessment, and mitigation investments. However, such approaches no matter how popular demand very detailed knowledge about the IT security domain and the enterprise/cyber architectural context. Typically, the critical nature and/or high stakes require careful consideration and adaptation of a balanced approach that provides reliable and consistent methods for rating vulnerabilities. As reported in earlier works, the Cyberspace Security Econometrics System provides a comprehensive measure of reliability, security and safety of a system that accounts for the criticality of each requirement as a function of one or more stakeholders' interests in that requirement. This paper advocates a dependability measure that acknowledges the aggregate structure of complex system specifications, and accounts for variations by stakeholder, by specification components, and by verification and validation impact. © 2009 IEEE.
Identifier
67650466349 (Scopus)
ISBN
[9781424427697]
Publication Title
2009 IEEE Symposium on Computational Intelligence in Cyber Security Cics 2009 Proceedings
External Full Text Location
https://doi.org/10.1109/CICYBS.2009.4925092
First Page
69
Last Page
75
Recommended Citation
Abercrombie, Robert K.; Sheldon, Frederick T.; and Mili, Ali, "Managing complex IT security processes with value based measures" (2009). Faculty Publications. 12308.
https://digitalcommons.njit.edu/fac_pubs/12308
