Model Based Evaluation of Cybersecurity Implementations

被引:1
|
作者
Dasso, Aristides [1 ]
Funes, Ana [1 ]
Montejano, German [1 ]
Riesco, Daniel [1 ]
Uzal, Roberto [1 ]
Debnath, Narayan [2 ]
机构
[1] Univ Nacl San Luis, SEG, Ejercito Los Andes 950, San Luis, Argentina
[2] Winona State Univ, Winona, MN 55987 USA
来源
关键词
Cybersecurityevaluation; Cybersecurity implementation; Evaluation methods; Logic Score of Preference method; LSP method; Continuous logic;
D O I
10.1007/978-3-319-32467-8_28
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Evaluation of Cybersecurity implementations is an important issue that is increasingly being considered in the agenda of organisations. We present here a model for the evaluation of Cybersecurity requirements. We start by establishing a set of security requirements in the form of a hierarchical structure to obtain a requirement tree, as it is prescribed by the Logic Score of Preference (LSP) evaluation method. Security requirements have been taken from the ISO/IEC 27002 standard. This requirement tree and an aggregation structure, built into a later step, form our Cybersecurity evaluation model, which allows to obtain a numerical final result for each system under evaluation. These final indicators, ranging into the interval 0.. 100, clearly show the degree of compliance of the systems under evaluation with respect to the desired requisites.
引用
收藏
页码:303 / 313
页数:11
相关论文
共 50 条
  • [21] Cybersecurity decision support model to designing information technology security system based on risk analysis and cybersecurity framework
    Razikin, Khairur
    Soewito, Benfano
    EGYPTIAN INFORMATICS JOURNAL, 2022, 23 (03) : 383 - 404
  • [22] Evaluation Strategies for Telehealth Implementations
    Maeder, Anthony
    Poultney, Nathan
    2016 IEEE INTERNATIONAL CONFERENCE ON HEALTHCARE INFORMATICS (ICHI), 2016, : 363 - 366
  • [23] Exploring the Challenges and Issues in Adopting Cybersecurity in Saudi Smart Cities: Conceptualization of the Cybersecurity-Based UTAUT Model
    Alhalafi, Nawaf
    Veeraraghavan, Prakash
    SMART CITIES, 2023, 6 (03): : 1523 - 1544
  • [24] A Testbed for Evaluating Performance and Cybersecurity Implications of IEC-61850 GOOSE Hardware Implementations
    Boeding, Matthew
    Hempel, Michael
    Sharif, Hamid
    Lopez, Juan, Jr.
    Perumalla, Kalyan
    2023 IEEE 20TH CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC, 2023,
  • [25] A Non-Cooperative Game based Model for the Cybersecurity of Autonomous Systems
    Jahan, Farha
    Sun, Weiqing
    Niyaz, Quamar
    2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2020), 2020, : 202 - 207
  • [26] Cyber-Attack Scoring Model Based on the Offensive Cybersecurity Framework
    Kim, Kyounggon
    Alfouzan, Faisal Abdulaziz
    Kim, Huykang
    APPLIED SCIENCES-BASEL, 2021, 11 (16):
  • [27] An Example of a Cybersecurity Education Model
    Turkanovic, Muhamed
    Welzer, Tatjana
    Holbl, Marko
    2019 29TH ANNUAL CONFERENCE OF THE EUROPEAN ASSOCIATION FOR EDUCATION IN ELECTRICAL AND INFORMATION ENGINEERING (EAEEIE 2019), 2019,
  • [28] A Conceptual Model for Cybersecurity Governance
    Yusif, Salifu
    Hafeez-Baig, Abdul
    JOURNAL OF APPLIED SECURITY RESEARCH, 2021, 16 (04) : 490 - 513
  • [29] Cybersecurity for railways - A maturity model
    Kour, Ravdeep
    Karim, Ramin
    Thaduri, Adithya
    PROCEEDINGS OF THE INSTITUTION OF MECHANICAL ENGINEERS PART F-JOURNAL OF RAIL AND RAPID TRANSIT, 2020, 234 (10) : 1129 - 1148
  • [30] CyberEyes: Cybersecurity Entity Recognition Model Based on Graph Convolutional Network
    Fang, Yong
    Zhang, Yuchi
    Huang, Cheng
    COMPUTER JOURNAL, 2021, 64 (08): : 1215 - 1225