A Multidimensional Approach Towards a Quantitative Assessment of Security Threats

被引:16
|
作者
Jouini, Mouna [1 ]
Rabai, Latifa Ben Arfa [1 ,2 ]
Khedri, Ridha [3 ]
机构
[1] Tunis Univ, Inst Super Gest Tunis, Tunis, Tunisia
[2] Tunis El Manar Univ, Dept Comp Sci, LIPAH, Fac Sci Tunis, Tunis, Tunisia
[3] McMaster Univ, Dept Comp & Software, Hamilton, ON, Canada
关键词
Information security; threat classification; security dimension; security perspective; security risk assessment; security threats; multidimensional mean failure cost;
D O I
10.1016/j.procs.2015.05.024
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Information security is the most challenging aspect of information processing. Organizations, governments, and individuals are facing many information security risks. These risks can cause serious damages that might lead to significant financial losses, breach of the confidentiality of sensitive information, or loss of integrity or availability of sensitive data. To facilitate effective protection of information, a better identification, understanding, and assessment of security threat and their characteristics are crucial for system security managers. In order to define and then assess security threats, we propose a new threat identification approach on which we build a quantitative security risk model for information systems. The proposed model is systematic, extendable, and modular. The aim is to help managers accurately assess security threat in an incremental and comprehensive way. (C) 2015 The Authors. Published by Elsevier B.V. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
引用
收藏
页码:507 / 514
页数:8
相关论文
共 50 条
  • [1] A Statistical Approach to the Assessment of Security threats Information System
    Semin, Valeriy G.
    Kabanov, Artem S.
    Los, Lexei B.
    [J]. PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE QUALITY MANAGEMENT,TRANSPORT AND INFORMATION SECURITY, INFORMATION TECHNOLOGIES (IT&QM&IS), 2017, : 100 - 105
  • [2] Towards Security Threats that Matter
    Tuma, Katja
    Scandariato, Riccardo
    Widman, Mathias
    Sandberg, Christian
    [J]. COMPUTER SECURITY, 2017, 2018, 10683 : 47 - 62
  • [3] Quantitative method of risks assessment of information security for multi component threats
    Muratkhan, R.
    Satybaldina, D. Zh.
    [J]. BULLETIN OF THE KARAGANDA UNIVERSITY-MATHEMATICS, 2014, 75 (03): : 103 - 110
  • [4] Towards a social network approach for monitoring insider threats to information security
    Natarajan, A
    Hossain, L
    [J]. INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2004, 3073 : 501 - 507
  • [5] Towards Integrated Quantitative Security and Safety Risk Assessment
    Dobaj, Juergen
    Schmittner, Christoph
    Krisper, Michael
    Macher, Georg
    [J]. COMPUTER SAFETY, RELIABILITY, AND SECURITY, SAFECOMP 2019, 2019, 11699 : 102 - 116
  • [6] A Quantitative Assessment Approach to COTS Component Security
    Chen, Jinfu
    Lu, Yansheng
    Wang, Huanhuan
    Mao, Chengying
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 2013, 2013
  • [7] TOWARDS A FRAMEWORK FOR MULTIDIMENSIONAL QUALITATIVE ANALYSES AND QUANTITATIVE ASSESSMENT OF BUSINESS MODELS
    Pisciella, Paolo
    Strasunskas, Darijus
    [J]. INFORMATION TECHNOLOGIES' 2009, 2009, : 61 - 71
  • [8] Towards a Taxonomy for Security Threats on the Web Ecosystem
    Silva, Carlo
    Batista, Ricardo
    Queiroz, Ruy
    Garcia, Vinicius
    Silva, Jose
    Gatti, Daniel
    Assad, Rodrigo
    Nascimento, Leandro
    Brito, Kellyton
    Miranda, Pericles
    [J]. NOMS 2016 - 2016 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, 2016, : 584 - 590
  • [9] Cyber Security Risk Modelling and Assessment: A Quantitative Approach
    Sokri, Abderrahmane
    [J]. PROCEEDINGS OF THE 18TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS 2019), 2019, : 466 - 474
  • [10] A new quantitative approach for information security risk assessment
    Asosheh, Abbas
    Dehmoubed, Bijan
    Khani, Amir
    [J]. 2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 2, 2009, : 222 - +