Information risk and security modelling

被引:0
|
作者
Zivic, P [1 ]
机构
[1] Scienton Technol, Toronto, ON M5V 2H1, Canada
关键词
information risk; risk analysis; risk management; risk metrics; risk modeling; threats; security modeling; security metrics; security management; operation assets; information value; ISO17799; BS7799; CC; ISO15408; ISO21827; SSE-CMM; ITSM/ITIL; CobiT (R); GMITS; ISO13335; NIST; NSA Infosec Assessment;
D O I
10.1117/12.604602
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This research paper presentation will feature current frameworks to addressing risk and security modeling and metrics. The paper will analyze technical level risk and security metrics of Common Criteria/ISO15408, Centre for Internet Security guidelines, NSA configuration guidelines and metrics used at this level. Information IT operational standards view on security metrics such as GMITS/ISO13335, ITIL/ITMS and architectural guidelines such as ISO7498-2 will be explained. Business process level standards such as ISO17799, COSO and CobiT (R) will be presented with their control approach to security metrics. Top level, the maturity standards such as SSE-CMM/ISO21827, NSA Infosec Assessment and CobiT (R) will be explored and reviewed. For each defined level of security metrics the research presentation will explore the appropriate usage of these standards. The paper will discuss standards approaches to conducting the risk and security metrics. The research findings will demonstrate the need for common baseline for both risk and security metrics. This paper will show the relation between the attribute based common baseline and corporate assets and controls for risk and security metrics. IT will be shown that such approach spans over all mentioned standards. The proposed approach 3D visual presentation and development of the Information Security Model will be analyzed and postulated. Presentation will clearly demonstrate the benefits of proposed attributes based approach and defined risk and security space for modeling and measuring.
引用
收藏
页码:142 / 150
页数:9
相关论文
共 50 条
  • [1] An economic modelling approach to information security risk management
    Bojanc, Rok
    Jerman-Blazic, Borka
    [J]. INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2008, 28 (05) : 413 - 422
  • [2] Security modelling for risk analysis
    Kwok, LF
    Longley, D
    [J]. SECURITY AND PROTECTION IN INFORMATION PROCESSING SYSTEMS, 2004, 147 : 29 - 45
  • [3] Modelling downgrading in information flow security
    Bossi, A
    Piazza, C
    Rossi, S
    [J]. 17TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2004, : 187 - 201
  • [4] Prospectives for modelling trust in information security
    Josang, A
    [J]. INFORMATION SECURITY AND PRIVACY, 1997, 1270 : 2 - 13
  • [5] A Study on Information Security Situation Modelling
    Srivastava, Ashish
    Shrivastava, Pallavi
    [J]. 2018 3RD INTERNATIONAL CONFERENCE FOR CONVERGENCE IN TECHNOLOGY (I2CT), 2018,
  • [6] MODELLING FOR ENSURING INFORMATION SECURITY OF THE DISTRIBUTED INFORMATION SYSTEMS
    Grusho, Alexander A.
    Timonina, Elena E.
    Shorgin, Sergey Ya.
    [J]. PROCEEDINGS - 31ST EUROPEAN CONFERENCE ON MODELLING AND SIMULATION ECMS 2017, 2017, : 656 - 660
  • [7] INFORMATION SECURITY RISK IN BANKING
    Wawrzyniak, Dariusz
    [J]. ARGUMENTA OECONOMICA, 2013, 30 (01): : 196 - 197
  • [8] INFORMATION SECURITY RISK IN BANKING
    Chmielarz, Witold
    [J]. ARGUMENTA OECONOMICA, 2014, 32 (01): : 197 - 200
  • [9] The Information Security Risk Management
    Semin, Valeriy G.
    Shmakova, Elena G.
    Los, Lexei B.
    [J]. PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE QUALITY MANAGEMENT,TRANSPORT AND INFORMATION SECURITY, INFORMATION TECHNOLOGIES (IT&QM&IS), 2017, : 106 - 109
  • [10] Information security and risk management
    Bodin, Lawrence D.
    Gordon, Lawrence A.
    Loeb, Martin P.
    [J]. COMMUNICATIONS OF THE ACM, 2008, 51 (04) : 64 - 68