Estimation of deficiency risk and prioritization of information security controls: A data-centric approach

被引:10
|
作者
Rahimian, Firoozeh [1 ]
Bajaj, Akhilesh [2 ]
Bradley, Wray [2 ]
机构
[1] Cyber Secur Inst, Dept Comp Sci, Cambridge, MA USA
[2] Univ Tulsa, 800 S Tucker Dr, Tulsa, OK 74104 USA
关键词
Security audit; Security controls; User security specifications; Collaborative security specification; Information security audit; Design science research; SYSTEM SECURITY; DESIGN SCIENCE; INTERNAL AUDIT; MANAGEMENT; QUALITY;
D O I
10.1016/j.accinf.2016.01.004
中图分类号
F [经济];
学科分类号
02 ;
摘要
Risk of unauthorized disclosure or modification of corporate data can impact in different ways, including affecting operations, the public image and/or the firm's legal/compliance exposure. While management views risk along these dimensions, the information technology function (ITF) typically views risk from an IT infrastructure compromise viewpoint, and this drives the establishment of IT security controls. It is oftentimes difficult for the internal audit function (IAF) to assess control deficiency risk (CDR) in the area of information security, as well as estimate the importance of each in-place security control. Using a design science approach, we propose the Operational, Public image, Legal (OPL) model and method to classify the security criticality of the organization's data along three dimensions. Through an empirical study, we demonstrate how the OPL method allows for a quantitative estimation of the importance of in-place security controls as well as the CDR of missing controls. This information provides guidance on strategies for testing in-place controls during audit, as well as for determining which controls may need to be incrementally added. (C) 2016 Elsevier Inc. All rights reserved.
引用
收藏
页码:38 / 64
页数:27
相关论文
共 50 条
  • [1] Data-Centric Security for the IoT
    Schreckling, Daniel
    Parra, Juan David
    Doukas, Charalampos
    Posegga, Joachim
    [J]. INTERNET OF THINGS: IOT INFRASTRUCTURES, IOT 360, PT II, 2016, 170 : 77 - 86
  • [2] Data-centric security: Integrating data privacy and data security
    Hennessy, S. D.
    Lauer, G. D.
    Zunic, N.
    Gerber, B.
    Nelson, A. C.
    [J]. IBM JOURNAL OF RESEARCH AND DEVELOPMENT, 2009, 53 (02)
  • [3] A data-centric security analysis of ICGrid
    Luna, Jesus
    Flouris, Michail
    Marazakis, Manolis
    Bilas, Angelos
    [J]. GRID COMPUTING: ACHIEVEMENTS AND PROSPECTS, 2008, : 197 - 208
  • [4] A Data-Centric Approach to Quality Estimation of Role Mining Results
    Dong, Lijun
    Wu, Kui
    Tang, Guoming
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (12) : 2678 - 2692
  • [5] A Data-Centric Approach to Synchronization
    Dolby, Julian
    Hammer, Christian
    Marino, Daniel
    Tip, Frank
    Vaziri, Mandana
    Vitek, Jan
    [J]. ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 2012, 34 (01):
  • [6] A Data-Centric Approach to Loss Mechanisms
    Senior, Alistair C.
    Miller, Robert J.
    [J]. JOURNAL OF TURBOMACHINERY-TRANSACTIONS OF THE ASME, 2024, 146 (04):
  • [7] A Data-Centric Approach to Change Management
    Nwokeji, Joshua Chibuike
    Clark, Tony
    Barn, Balbir
    Kulkarni, Vinay
    Anum, Sheena O.
    [J]. PROCEEDINGS OF THE 2015 IEEE 19TH INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE, 2015, : 185 - 190
  • [8] A DATA-CENTRIC APPROACH TO LOSS MECHANISMS
    Senior, Alistair C.
    Miller, Robert J.
    [J]. PROCEEDINGS OF ASME TURBO EXPO 2023: TURBOMACHINERY TECHNICAL CONFERENCE AND EXPOSITION, GT2023, VOL 13A, 2023,
  • [9] A data-centric approach to distributed tracing
    Popa, Nicolae Marian
    Oprescu, Ana
    [J]. 11TH IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM 2019), 2019, : 209 - 216
  • [10] Data-centric information dissemination in opportunistic environments
    Carreras, Iacopo
    Tacconi, David
    Miorandi, Daniele
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR SYSTEMS, VOLS 1-3, 2007, : 780 - 782