Attack Tree Based Information Security Risk Assessment Method Integrating Enterprise Objectives with Vulnerabilities

被引:0
|
作者
Karabey, Bugra [1 ]
Baykal, Nazife [1 ]
机构
[1] Middle E Tech Univ, Inst Informat, Ankara, Turkey
关键词
Enterprise information security; enterprise modelling; risk assessment; risk assessment method; resource based view; attack trees; risk management; DESIGN; SCIENCE;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In order to perform the analysis and mitigation efforts related with the information security risks there exists quantitative and qualitative approaches, but the most critical shortcoming of these methods is the fact that the outcome mainly addresses the needs and priorities of the technical community rather than the management. For the enterprise management, this information is essentially required as a decision making aid for the asset allocation and the prioritization of mitigation efforts, so, ideally the outcome of an information security risk method must be in synchronization with the enterprise objectives to act as a useful decision tool for the management. also, in the modelling of the threat domain, attack trees are frequently utilized However the execution of attack tree modelling is costly from the effort and timing requirements and also, has inherent scalability issues. so, within this article our design-science research based work on an information security risk assessment method that addresses these two issues of enterprise objective inclusion and model scalability will be outlined
引用
收藏
页码:297 / 304
页数:8
相关论文
共 50 条
  • [21] A Hierarchical Network Security Risk Assessment Method Based on Vulnerability Attack Link Generated
    Yang, Jungang
    Liang, Li
    Yang, Yanfeng
    Zhu, Guangliang
    2012 INTERNATIONAL SYMPOSIUM ON INFORMATION SCIENCE AND ENGINEERING (ISISE), 2012, : 113 - 118
  • [22] Security risk assessment framework for smart car using the attack tree analysis
    Kong, Hee-Kyung
    Hong, Myoung Ki
    Kim, Tae-Sung
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2018, 9 (03) : 531 - 551
  • [23] Security risk assessment framework for smart car using the attack tree analysis
    Hee-Kyung Kong
    Myoung Ki Hong
    Tae-Sung Kim
    Journal of Ambient Intelligence and Humanized Computing, 2018, 9 : 531 - 551
  • [24] Network security equipment evaluation based on attack tree with risk fusion
    CHENG Ran
    LU Yue-ming
    网络与信息安全学报, 2017, 3 (07) : 70 - 77
  • [25] Assessment of Information Security Vulnerabilities in Common Seismological Equipment
    Samios, Michael
    Evangelidis, Christos P.
    Serrelis, Emmanouil
    SEISMOLOGICAL RESEARCH LETTERS, 2021, 92 (02) : 933 - 940
  • [26] Security Risk Assessment Approach for Distribution Network Cyber Physical Systems Considering Cyber Attack Vulnerabilities
    Zhou, Buxiang
    Sun, Binjie
    Zang, Tianlei
    Cai, Yating
    Wu, Jiale
    Luo, Huan
    ENTROPY, 2023, 25 (01)
  • [27] Network Security Risk Assessment Based on Enterprise Environment Characteristics
    Yang, Yunxue
    Yang, Zhenqi
    Yang, Qin
    Ji, Guohua
    Xue, Shengjun
    International Journal of Network Security, 2022, 24 (01) : 156 - 165
  • [28] Model-based risk assessment to improve enterprise security
    Aagedal, JO
    den Braber, F
    Dimitrakos, T
    Gran, BA
    Raptis, D
    Stolen, K
    SIXTH INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE, PROCEEDINGS, 2002, : 51 - 62
  • [29] Risk Assessment of Attack in Autonomous Vehicle based on a Decision Tree
    Ftaimi, Sara
    Mazri, Tomader
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (07) : 792 - 801
  • [30] A RISK ASSESSMENT SCHEME OF INTELLIGNET TERMINAL BASED ON ATTACK TREE
    Wei, Fang
    Zhang, Miao
    PROCEEDINGS OF 2016 4TH IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENCE SYSTEMS (IEEE CCIS 2016), 2016, : 67 - 71