The Design and Evaluation of a User-Centric Information Security Risk Assessment and Response Framework

被引:0
|
作者
Alohali, Manal [1 ,2 ]
Clarke, Nathan [1 ,3 ]
Furnell, Steven [1 ,3 ,4 ]
机构
[1] Plymouth Univ, Ctr Secur Commun & Network Res, Plymouth, Devon, England
[2] Princess Nourah Bint Abdulrahman Univ, Coll Comp & Informat Sci, Riyadh, Saudi Arabia
[3] Edith Cowan Univ, Secur Res Inst, Churchlands, WA, Australia
[4] Nelson Mandela Univ, Ctr Res Informat & Cyber Secur, Sch ICT, Port Elizabeth, South Africa
关键词
Risk; analysis; security behavior; BFI; correlation;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The risk of sensitive information disclosure and modification through the use of online services has increased considerably and may result in significant damage. As the management and assessment of such risks is a well-known discipline for organizations, it is a challenge for users from the general public. Users have difficulties in using, understanding and reacting to security-related threats. Moreover, users only try to protect themselves from risks salient to them. Motivated by the lack of risk assessment solutions and limited impact of awareness programs tailored for users of the general public, this paper aims to develop a structured approach to help in protecting users from threats and vulnerabilities and, thus, reducing the overall information security risks. By focusing on the user and that different users react differently to the same stimuli, the authors developed a user-centric risk assessment and response framework that assesses and communicates risk on both user and system level in an individualized, timely and continuous way. Three risk assessment models were proposed that depend on user-centric and behavior-related factors when calculating risk. This framework was evaluated using a scenario-based simulation of a number of users and results analyzed. The analysis demonstrated the effectiveness and feasibility of the proposed approach. Encouragingly, this analysis provided an indication that risk can be assessed differently for the same behavior based upon a number of user-centric and behavioral-related factors resulting in an individualized granular risk score/level. This granular risk assessment, provided a more insightful evaluation of both risk and response. The analysis of results was also useful in demonstrating how risk is not the same for all users and how the proposed model is effective in adapting to differences between users offering a novel approach to assessing information security risks.
引用
收藏
页码:148 / 163
页数:16
相关论文
共 50 条
  • [1] Information Security Risk Communication: A User-centric Approach
    Alohali, Manal
    Clarke, Nathan
    Furnell, Steven
    [J]. 2019 IEEE/ACS 16TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA 2019), 2019,
  • [2] RIFLE: An architectural framework for user-centric information-flow security
    Vachharajani, N
    Bridges, MJ
    Chang, J
    Rangan, R
    Ottoni, G
    Blome, JA
    Reis, GA
    Vachharajani, M
    August, DI
    [J]. MICRO-37 2004: 37TH ANNUAL INTERNATIONAL SYMPOSIUM ON MICROARCHITECTURE, PROCEEDINGS, 2004, : 243 - 254
  • [3] User-Centric Security
    Feth, Denis
    [J]. 2015 10TH JOINT MEETING OF THE EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND THE ACM SIGSOFT SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING (ESEC/FSE 2015) PROCEEDINGS, 2015, : 1034 - 1037
  • [4] Development of a Security Application based on User-centric Evaluation
    Jeong, Jongmun
    Hwang, Mintae
    [J]. 2016 6TH INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS 2016), 2016, : 225 - 228
  • [5] User-centric Design
    Fuchs, Andreas
    [J]. Fuchs, Andreas, 1600, Springer Vieweg (13) : 8 - 9
  • [6] User-Centric Information Security Systems - A Living lab Approach
    Dlamini, Moses
    Eloff, Jan
    Zielinksi, Marek
    Chuang, Jason
    Smit, Danie
    [J]. PROCEEDINGS OF THE 10TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2011, : 73 - 80
  • [7] User-centric Security and The Dynamic Enterprise
    Cosquer, F.
    [J]. ENRICHING COMMUNICATIONS, 2009, 3 (01): : 53 - 56
  • [8] A User-Centric Machine Learning Framework for Cyber Security Operations Center
    Feng, Charles
    Wu, Shuning
    Liu, Ningwei
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2017, : 173 - 175
  • [9] User-centric evolutionary design
    Parmee, IC
    Abraham, JA
    [J]. Design 2004: Proceedings of the 8th International Design Conference, Vols 1-3, 2004, : 1441 - 1446
  • [10] A user-centric quantum benchmarking test suite and evaluation framework
    Liu, Wenbo
    Wang, Fei
    Lin, Han
    Shang, Jiandong
    [J]. QUANTUM INFORMATION PROCESSING, 2023, 22 (11)