Attack Tree Based Information Security Risk Assessment Method Integrating Enterprise Objectives with Vulnerabilities

被引:0
|
作者
Karabey, Bugra [1 ]
Baykal, Nazife [1 ]
机构
[1] Middle E Tech Univ, Inst Informat, Ankara, Turkey
关键词
Enterprise information security; enterprise modelling; risk assessment; risk assessment method; resource based view; attack trees; risk management; DESIGN; SCIENCE;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In order to perform the analysis and mitigation efforts related with the information security risks there exists quantitative and qualitative approaches, but the most critical shortcoming of these methods is the fact that the outcome mainly addresses the needs and priorities of the technical community rather than the management. For the enterprise management, this information is essentially required as a decision making aid for the asset allocation and the prioritization of mitigation efforts, so, ideally the outcome of an information security risk method must be in synchronization with the enterprise objectives to act as a useful decision tool for the management. also, in the modelling of the threat domain, attack trees are frequently utilized However the execution of attack tree modelling is costly from the effort and timing requirements and also, has inherent scalability issues. so, within this article our design-science research based work on an information security risk assessment method that addresses these two issues of enterprise objective inclusion and model scalability will be outlined
引用
收藏
页码:297 / 304
页数:8
相关论文
共 50 条
  • [31] Risk assessment of enterprise merger and acquisition based on event tree method and fuzzy set theory
    Li, G.-R., 1600, Asian Network for Scientific Information (13):
  • [32] Network Information Security Risk Assessment Method Based on Machine Learning Algorithm
    Jiang, Ruirong
    Wan, Liyong
    ADVANCED HYBRID INFORMATION PROCESSING, ADHIP 2022, PT II, 2023, 469 : 403 - 416
  • [33] An information Security Risk Assessment Method Based on Conduct Effect and Dynamic Threat
    Qiao Hong
    Tian Jianwei
    Tian Zheng
    Qi Wenhui
    Li Xi
    Zhu Hongyu
    Chen Shengsheng
    PROCEEDINGS OF 2017 8TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2017), 2017, : 782 - 786
  • [34] Research on Information Security Risk Assessment Method Based on Fuzzy Rule Set
    Cai, Wentian
    Yao, Huijun
    Wireless Communications and Mobile Computing, 2021, 2021
  • [35] Research on Information Security Risk Assessment Method Based on Fuzzy Rule Set
    Cai, Wentian
    Yao, Huijun
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [36] Method of Information Security Risk Assessment Based on Improved Fuzzy Theory of Evidence
    Huang Xuepeng
    Xu Wei
    INTERNATIONAL JOURNAL OF ONLINE ENGINEERING, 2018, 14 (03) : 188 - 196
  • [37] Assessment Model and Method Research of Information Security Risk
    Lu Zhen
    Xiong Zhen
    Tu Keqin
    FRONTIERS OF MANUFACTURING AND DESIGN SCIENCE IV, PTS 1-5, 2014, 496-500 : 2170 - +
  • [38] Information security risk assessment using the AHP method
    Zaburko, J.
    Szulzyk-Cieplak, J.
    IV INTERNATIONAL CONFERENCE OF COMPUTATIONAL METHODS IN ENGINEERING SCIENCE (CMES'19), 2019, 710
  • [39] An Improved Risk Assessment Method for SCADA Information Security
    Markovic-Petrovic, J. D.
    Stojanovic, M. D.
    ELEKTRONIKA IR ELEKTROTECHNIKA, 2014, 20 (07) : 69 - 72
  • [40] Application of Big Data Technology in Enterprise Information Security Management and Risk Assessment
    Wang, Yawen
    Xue, Weixian
    Zhang, Anqi
    JOURNAL OF GLOBAL INFORMATION MANAGEMENT, 2023, 31 (03)