Heuristic Evaluation of Vulnerability Risk Management Leaders' Presentations of Cyber Threat and Cyber Risk

被引:0
|
作者
Nichols, Chris [1 ]
Stoker, Geoff [1 ]
Clark, Ulku [1 ]
机构
[1] Univ North Carolina Wilmington, Wilmington, NC 28403 USA
关键词
Cybersecurity; HCI; Heuristic evaluation;
D O I
10.1007/978-3-030-77392-2_14
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This work is an initial investigation into the way cybersecurity companies convey the concept of cyber-related threat and/or cyber-related risk to their clients. We survey the current cybersecurity business landscape and examine product outputs from a select group of companies identified by the analyst firm Forrester [24] as leading providers of vulnerability risk management services. Of specific interest are those tools/products that reflect a cybersecurity company's efforts to combine data related to vulnerability information, threat intelligence, asset criticality, and/or network exposure in order to distill and quantify the complex ideas of cyber threat and cyber risk into relatively simple outputs like a single value or chart. We conduct a heuristic evaluation [9, 11] of static views of the vendors' offerings and introduce the concept of the mythical average, reasonable IT professional (MARIP) to inspect the product outputs with respect to the key HCI principles of familiarity and consistency as they pertain to use of colors, numbers, and charts.
引用
下载
收藏
页码:212 / 225
页数:14
相关论文
共 50 条
  • [1] CYBER SECURITY: THREAT IDENTIFICATION, RISK AND VULNERABILITY ASSESSMENT
    Umberger, Harold
    Gheorghe, Adrian
    ENERGY SECURITY: INTERNATIONAL AND LOCAL ISSUES, THEORETICAL PERSPECTIVES, AND CRITICAL ENERGY INFRASTRUCTURES, 2008, : 247 - 269
  • [2] Cyber Threat Intelligence in Risk Management A Survey of the Impact of Cyber Threat Intelligence on Saudi Higher Education Risk Management
    Aljuhami, Amira M.
    Bamasoud, Doaa M.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (10) : 156 - 164
  • [3] Cyber risk and vulnerability estimation
    Cam, Hasan
    JOURNAL OF DEFENSE MODELING AND SIMULATION-APPLICATIONS METHODOLOGY TECHNOLOGY-JDMS, 2022, 19 (01): : 3 - 4
  • [4] Risk Management Using Cyber-Threat Information Sharing and Cyber-Insurance
    Tosh, Deepak K.
    Shetty, Sachin
    Sengupta, Shamik
    Kesan, Jay P.
    Kamhoua, Charles A.
    GAME THEORY FOR NETWORKS (GAMENETS 2017), 2017, 212 : 154 - 164
  • [5] Quantifying Cyber Vulnerability and Risk in Acquisitions
    Pendleton, Aaron
    Reith, Mark
    PROCEEDINGS OF THE 14TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2019), 2019, : 618 - 624
  • [6] A Web Platform for Integrated Vulnerability Assessment and Cyber Risk Management
    Russo, Pietro
    Caponi, Alberto
    Leuti, Marco
    Bianchi, Giuseppe
    INFORMATION, 2019, 10 (07)
  • [7] Robust Cyber-threat and Vulnerability Information Analyzer for Dynamic Risk Assessment
    Malik, Adeel A.
    Tosh, Deepak K.
    2021 IEEE INTERNATIONAL MEDITERRANEAN CONFERENCE ON COMMUNICATIONS AND NETWORKING (IEEE MEDITCOM 2021), 2021, : 168 - 173
  • [8] Cyber Threat Intelligence for Improving Cybersecurity and Risk Management in Critical Infrastructure
    Kure, Halima Ibrahim
    Islam, Shareeful
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2019, 25 (11) : 1478 - 1502
  • [9] Cyber-threat perception and risk management in the Swedish financial sector
    Varga, Stefan
    Brynielsson, Joel
    Franke, Ulrik
    COMPUTERS & SECURITY, 2021, 105
  • [10] Risk management - Cyber liability
    Haugh, R
    HOSPITALS & HEALTH NETWORKS, 2001, 75 (03): : 16 - 17