Model Based Evaluation of Cybersecurity Implementations

被引:1
|
作者
Dasso, Aristides [1 ]
Funes, Ana [1 ]
Montejano, German [1 ]
Riesco, Daniel [1 ]
Uzal, Roberto [1 ]
Debnath, Narayan [2 ]
机构
[1] Univ Nacl San Luis, SEG, Ejercito Los Andes 950, San Luis, Argentina
[2] Winona State Univ, Winona, MN 55987 USA
来源
关键词
Cybersecurityevaluation; Cybersecurity implementation; Evaluation methods; Logic Score of Preference method; LSP method; Continuous logic;
D O I
10.1007/978-3-319-32467-8_28
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Evaluation of Cybersecurity implementations is an important issue that is increasingly being considered in the agenda of organisations. We present here a model for the evaluation of Cybersecurity requirements. We start by establishing a set of security requirements in the form of a hierarchical structure to obtain a requirement tree, as it is prescribed by the Logic Score of Preference (LSP) evaluation method. Security requirements have been taken from the ISO/IEC 27002 standard. This requirement tree and an aggregation structure, built into a later step, form our Cybersecurity evaluation model, which allows to obtain a numerical final result for each system under evaluation. These final indicators, ranging into the interval 0.. 100, clearly show the degree of compliance of the systems under evaluation with respect to the desired requisites.
引用
收藏
页码:303 / 313
页数:11
相关论文
共 50 条
  • [1] Cybersecurity in Universities: An Evaluation Model
    Haque M.A.
    Ahmad S.
    John A.
    Mishra K.
    Mishra B.K.
    Kumar K.
    Nazeer J.
    SN Computer Science, 4 (5)
  • [2] Managing Cybersecurity Risk Using Threat Based Methodology for Evaluation of Cybersecurity Architectures
    Bokan, Branko
    Santos, Joost
    2021 SYSTEMS AND INFORMATION ENGINEERING DESIGN SYMPOSIUM (IEEE SIEDS 2021), 2021, : 216 - 221
  • [3] Model-Based Cybersecurity AnalysisExtending Enterprise Modeling to Critical Infrastructure Cybersecurity
    Yuning Jiang
    Manfred A. Jeusfeld
    Jianguo Ding
    Elin Sandahl
    Business & Information Systems Engineering, 2023, 65 : 643 - 676
  • [4] Recent Granular Computing Implementations and its Feasibility in Cybersecurity Domain
    Pawlicki, Marek
    Choras, Michal
    Kozik, Rafal
    13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,
  • [5] Model-Based Cybersecurity Analysis Extending Enterprise Modeling to Critical Infrastructure Cybersecurity
    Jiang, Yuning
    Jeusfeld, Manfred A.
    Ding, Jianguo
    Sandahl, Elin
    BUSINESS & INFORMATION SYSTEMS ENGINEERING, 2023, 65 (06) : 643 - 676
  • [6] A Comprehensive Cybersecurity Audit Model to Improve Cybersecurity Assurance: The CyberSecurity Audit Model (CSAM)
    Sabillon, Regner
    Serra-Ruiz, Jordi
    Cavaller, Victor
    Cano, Jeimy
    2017 INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS AND COMPUTER SCIENCE (INCISCOS), 2017, : 253 - 259
  • [7] Cyber Evaluation and Management Toolkit (CEMT): Face Validity of Model-Based Cybersecurity Decision Making
    Fowler, Stuart
    Joiner, Keith
    Ma, Siqi
    SYSTEMS, 2024, 12 (07):
  • [8] Comprehensive Evaluation of OpenCL-Based CNN Implementations for FPGAs
    Tapiador-Morales, Ricardo
    Rios-Navarro, Antonio
    Linares-Barranco, Alejandro
    Kim, Minkyu
    Kadetotad, Deepak
    Seo, Jae-sun
    ADVANCES IN COMPUTATIONAL INTELLIGENCE, IWANN 2017, PT II, 2017, 10306 : 271 - 282
  • [9] GEMM-based level 3 BLAS:: High-performance model implementations and performance evaluation benchmark
    Kågström, B
    Ling, P
    Van Loan, C
    ACM TRANSACTIONS ON MATHEMATICAL SOFTWARE, 1998, 24 (03): : 268 - 302
  • [10] Model-Based Systems Engineering Cybersecurity for Space Systems
    Kirshner, Mitchell
    AEROSPACE, 2023, 10 (02)