A two-phase quantitative methodology for enterprise information security risk analysis

被引:0
|
作者
Bhattacharjee, Jaya [1 ]
Sengupta, Anirban [1 ]
Mazumdar, Chandan [1 ]
Barik, Mridul Sankar [1 ]
机构
[1] Jadavpur Univ, Dept Comp Sci & Engn, Kolkata 700032, India
来源
关键词
Asset Value; Enterprise Information Security; Risk Analysis; Risk Management; Security Concern;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Enterprises possess assets required for executing their business processes and activities. However, the assets contain vulnerabilities that can be exploited by threats to disrupt the business activities. The term risk in this context refers to the harm that can potentially occur if the threats exploit the vulnerabilities to cause damage to the assets. As the enterprise information infrastructure is becoming more complex and connected, the risks to enterprises' assets are also increasing. Hence, the process of identification, analysis, and mitigation of information security risks has assumed utmost importance. This paper presents a quantitative information security risk analysis methodology for enterprises. The methodology consists of two approaches - while the consolidated approach provides an overview of the risk profile of assets, the detailed approach identifies the threat-vulnerability pairs responsible for the risks. Based on the severity of risks to them, assets are categorized into three different risk zones, namely high, medium and low-risk zones. While the high-risk assets need high-end infrastructure for protection, the medium-risk assets may be safeguarded with the help of security policies, guidelines and procedures. The low-risk assets, on the other hand, may not need any explicit protection mechanism. This paper extends a previous work of the authors by incorporating a formal model of asset dependency, and detailing the activities and processes for the implementation of the proposed methodology. Moreover, the paper includes a detailed comparative survey of the existing risk analysis methodologies and tools.
引用
收藏
页码:5 / 17
页数:13
相关论文
共 50 条
  • [2] A Formal Methodology for Enterprise Information Security Risk Assessment
    Bhattacharjee, Jaya
    Sengupta, Anirban
    Mazumdar, Chandan
    [J]. 2013 INTERNATIONAL CONFERENCE ON RISKS AND SECURITY OF INTERNET AND SYSTEMS (CRISIS), 2013,
  • [3] Methodology of quantitative risk assessment for information system security
    Lin, MQ
    Wang, QM
    Li, JH
    [J]. COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 526 - 531
  • [4] Enterprise Risk Management and Information Systems Security Risk
    Olson, David L.
    Wu, Desheng
    [J]. PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON RISK MANAGEMENT & GLOBAL E-BUSINESS, VOLS I AND II, 2009, : 1 - 5
  • [5] Research on Enterprise Information Security Risk Management
    Wu Xiaoyan
    Yuan Hong
    Lin Hua
    [J]. PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON INNOVATION AND MANAGEMENT, 2013, : 924 - +
  • [6] Two-phase Attacks in Security Games
    Nagorko, Andrzej
    Ciosmak, Pawel
    Michalak, Tomasz
    [J]. UNCERTAINTY IN ARTIFICIAL INTELLIGENCE, 2023, 216 : 1489 - 1498
  • [7] Overview of Enterprise Information Needs in Information Security Risk Assessment
    Korman, Matus
    Ekstedt, Mathias
    Sommestad, Teodor
    Hallberg, Jonas
    Bengtsson, Johan
    [J]. PROCEEDINGS OF THE 2014 IEEE 18TH INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE (EDOC 2014), 2014, : 42 - 51
  • [8] A Quantitative Methodology for Cloud Security Risk Assessment
    Basu, Srijita
    Sengupta, Anirban
    Mazumdar, Chandan
    [J]. CLOSER: PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND SERVICES SCIENCE, 2017, : 92 - 103
  • [9] A Quantitative Measure of the Security Risk Level of Enterprise Networks
    Munir, Rashid
    Disso, Jules Pagna
    Awan, Irfan
    Mufti, Muhammad Rafiq
    [J]. 2013 EIGHTH INTERNATIONAL CONFERENCE ON BROADBAND, WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS (BWCCA 2013), 2013, : 437 - 442
  • [10] Quantitative flux analysis of gas - Liquid two-phase ultrafiltration
    Cheng, TW
    Wu, JG
    [J]. SEPARATION SCIENCE AND TECHNOLOGY, 2003, 38 (04) : 817 - 835