Attack Tree Based Information Security Risk Assessment Method Integrating Enterprise Objectives with Vulnerabilities

被引:0
|
作者
Karabey, Bugra [1 ]
Baykal, Nazife [1 ]
机构
[1] Middle E Tech Univ, Inst Informat, Ankara, Turkey
关键词
Enterprise information security; enterprise modelling; risk assessment; risk assessment method; resource based view; attack trees; risk management; DESIGN; SCIENCE;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In order to perform the analysis and mitigation efforts related with the information security risks there exists quantitative and qualitative approaches, but the most critical shortcoming of these methods is the fact that the outcome mainly addresses the needs and priorities of the technical community rather than the management. For the enterprise management, this information is essentially required as a decision making aid for the asset allocation and the prioritization of mitigation efforts, so, ideally the outcome of an information security risk method must be in synchronization with the enterprise objectives to act as a useful decision tool for the management. also, in the modelling of the threat domain, attack trees are frequently utilized However the execution of attack tree modelling is costly from the effort and timing requirements and also, has inherent scalability issues. so, within this article our design-science research based work on an information security risk assessment method that addresses these two issues of enterprise objective inclusion and model scalability will be outlined
引用
收藏
页码:297 / 304
页数:8
相关论文
共 50 条
  • [41] Research on Operating Data Analysis for Enterprise Intranet Information Security Risk Assessment
    Wang, Hao
    Li, Junhao
    Liu, Dong
    PROCEEDINGS OF 2018 12TH IEEE INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION (ASID), 2018, : 72 - 76
  • [42] AN APPROACH FOR DESIGNING OF ENTERPRISE IT LANDSCAPES TO PERFORM QUANTITAVE INFORMATION SECURITY RISK ASSESSMENT
    Romanov, Anton
    Okamoto, Eiji
    SECRYPT 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2009, : 313 - 318
  • [43] Attacks and vulnerabilities of Wi-Fi Enterprise networks: User security awareness assessment through credential stealing attack experiments
    Palama, Ivan
    Amici, Alessandro
    Bellicini, Gabriele
    Gringoli, Francesco
    Pedretti, Fabio
    Bianchi, Giuseppe
    COMPUTER COMMUNICATIONS, 2023, 212 : 129 - 140
  • [44] Enterprise Risk Management and Information Systems Security Risk
    Olson, David L.
    Wu, Desheng
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON RISK MANAGEMENT & GLOBAL E-BUSINESS, VOLS I AND II, 2009, : 1 - 5
  • [45] Enterprise information systems within the context of information security: a risk assessment for a health organization in Turkey
    Eroglu, Sahika
    Cakmak, Tolga
    INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS/INTERNATIONAL CONFERENCE ON PROJECT MANAGEMENT/INTERNATIONAL CONFERENCE ON HEALTH AND SOCIAL CARE INFORMATION SYSTEMS AND TECHNOLOGIES, CENTERIS/PROJMAN / HCIST 2016, 2016, 100 : 979 - 986
  • [46] Assessment of enterprise information security - The importance of prioritization
    Johansson, E
    Johnson, P
    Ninth IEEE International EDOC Enterprise Computing Conference, Proceedings, 2005, : 207 - 218
  • [47] NetSecuritas: An Integrated Attack Graph-based Security Assessment Tool for Enterprise Networks
    Ghosh, Nirnay
    Chokshi, Ishan
    Sarkar, Mithun
    Ghosh, Soumya K.
    Kaushik, Anil Kumar
    Das, Sajal K.
    PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING AND NETWORKING, 2015,
  • [48] Information asset valuation method for information technology security risk assessment
    Foroughi, Farhad
    WORLD CONGRESS ON ENGINEERING 2008, VOLS I-II, 2008, : 576 - 581
  • [49] Overview of Information Security Management-Based on Enterprise Risk Management
    She, Jing-Huai
    Zhang, Run-Qiang
    She, Yuan
    Hou, Bing-Xin
    INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND INFORMATION SECURITY (CNIS 2015), 2015, : 384 - 387
  • [50] RFID Privacy Risk Evaluation Based on Synthetic Method of Extended Attack Tree and Information Feature Entropy
    Li, Peng
    Xu, Chao
    Chen, Long
    Wang, Ruchuan
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2015,