Estimation of deficiency risk and prioritization of information security controls: A data-centric approach

被引:10
|
作者
Rahimian, Firoozeh [1 ]
Bajaj, Akhilesh [2 ]
Bradley, Wray [2 ]
机构
[1] Cyber Secur Inst, Dept Comp Sci, Cambridge, MA USA
[2] Univ Tulsa, 800 S Tucker Dr, Tulsa, OK 74104 USA
关键词
Security audit; Security controls; User security specifications; Collaborative security specification; Information security audit; Design science research; SYSTEM SECURITY; DESIGN SCIENCE; INTERNAL AUDIT; MANAGEMENT; QUALITY;
D O I
10.1016/j.accinf.2016.01.004
中图分类号
F [经济];
学科分类号
02 ;
摘要
Risk of unauthorized disclosure or modification of corporate data can impact in different ways, including affecting operations, the public image and/or the firm's legal/compliance exposure. While management views risk along these dimensions, the information technology function (ITF) typically views risk from an IT infrastructure compromise viewpoint, and this drives the establishment of IT security controls. It is oftentimes difficult for the internal audit function (IAF) to assess control deficiency risk (CDR) in the area of information security, as well as estimate the importance of each in-place security control. Using a design science approach, we propose the Operational, Public image, Legal (OPL) model and method to classify the security criticality of the organization's data along three dimensions. Through an empirical study, we demonstrate how the OPL method allows for a quantitative estimation of the importance of in-place security controls as well as the CDR of missing controls. This information provides guidance on strategies for testing in-place controls during audit, as well as for determining which controls may need to be incrementally added. (C) 2016 Elsevier Inc. All rights reserved.
引用
收藏
页码:38 / 64
页数:27
相关论文
共 50 条
  • [31] Second International Workshop on Data-Centric Dependability and Security (DCDS)
    Medeiros, Iberia
    Gashi, Ilir
    Kamp, Michael
    Ferreira, Pedro
    [J]. Proceedings - 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN-W 2020, 2020,
  • [32] User-Controlled Security Mechanism in Data-Centric Clouds
    Liu, Qin
    Wang, Guojun
    Wu, Jie
    Chang, Wei
    [J]. 2015 IEEE 17TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2015 IEEE 7TH INTERNATIONAL SYMPOSIUM ON CYBERSPACE SAFETY AND SECURITY, AND 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (ICESS), 2015, : 647 - 653
  • [33] Data-centric Security in Military Applications of Commercial IoT Technology
    Wrona, Konrad
    de Castro, Angel
    Vasilache, Bogdan
    [J]. 2016 IEEE 3RD WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2016, : 239 - 244
  • [34] The Euclid Archive System: A Data-Centric Approach to Big Data
    Nieto, S.
    Belikov, A. N.
    Williams, O. R.
    Altieri, B.
    Boxhoorn, D.
    Buenadicha, G.
    Droge, B.
    McFarland, J. P.
    Salgado, J.
    de Teodoro, P.
    Tsyganov, A.
    Valentijn, E. A.
    [J]. ASTRONOMICAL DATA ANALYSIS SOFTWARE AND SYSTEMS XXVI, 2019, 521 : 12 - 15
  • [35] Data-centric approach for miscellaneous optical sensing and imaging
    Tanida, Jun
    Horisaki, Ryoichi
    [J]. HOLOGRAPHY, DIFFRACTIVE OPTICS, AND APPLICATIONS IX, 2019, 11188
  • [36] A data-centric approach for ethical and trustworthy AI in journalism
    Dierickx, Laurence
    Opdahl, Andreas Lothe
    Khan, Sohail Ahmed
    Linden, Carl-Gustav
    Guerrero Rojas, Diana Carolina
    [J]. ETHICS AND INFORMATION TECHNOLOGY, 2024, 26 (04)
  • [37] A data-centric approach to understanding the pricing of financial options
    J. Healy
    M. Dixon
    B. Read
    F.F. Cai
    [J]. The European Physical Journal B - Condensed Matter and Complex Systems, 2002, 27 : 219 - 227
  • [38] Understanding the Indian Labour Market: A Data-Centric Approach
    Shabana, K. M.
    Gracious, Tony
    Subramonian, Hrishikesh
    [J]. PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON DATA SCIENCE & ENGINEERING (ICDSE), 2016, : 26 - 31
  • [39] Data-centric AI approach for automated wildflower monitoring
    Schouten, Gerard
    Michielsen, Bas S. H. T.
    Gravendeel, Barbara
    [J]. PLOS ONE, 2024, 19 (09):
  • [40] A data-centric approach to understanding the pricing of financial options
    Healy, J
    Dixon, M
    Read, B
    Cai, FF
    [J]. EUROPEAN PHYSICAL JOURNAL B, 2002, 27 (02): : 219 - 227