Estimation of deficiency risk and prioritization of information security controls: A data-centric approach

被引:10
|
作者
Rahimian, Firoozeh [1 ]
Bajaj, Akhilesh [2 ]
Bradley, Wray [2 ]
机构
[1] Cyber Secur Inst, Dept Comp Sci, Cambridge, MA USA
[2] Univ Tulsa, 800 S Tucker Dr, Tulsa, OK 74104 USA
关键词
Security audit; Security controls; User security specifications; Collaborative security specification; Information security audit; Design science research; SYSTEM SECURITY; DESIGN SCIENCE; INTERNAL AUDIT; MANAGEMENT; QUALITY;
D O I
10.1016/j.accinf.2016.01.004
中图分类号
F [经济];
学科分类号
02 ;
摘要
Risk of unauthorized disclosure or modification of corporate data can impact in different ways, including affecting operations, the public image and/or the firm's legal/compliance exposure. While management views risk along these dimensions, the information technology function (ITF) typically views risk from an IT infrastructure compromise viewpoint, and this drives the establishment of IT security controls. It is oftentimes difficult for the internal audit function (IAF) to assess control deficiency risk (CDR) in the area of information security, as well as estimate the importance of each in-place security control. Using a design science approach, we propose the Operational, Public image, Legal (OPL) model and method to classify the security criticality of the organization's data along three dimensions. Through an empirical study, we demonstrate how the OPL method allows for a quantitative estimation of the importance of in-place security controls as well as the CDR of missing controls. This information provides guidance on strategies for testing in-place controls during audit, as well as for determining which controls may need to be incrementally added. (C) 2016 Elsevier Inc. All rights reserved.
引用
收藏
页码:38 / 64
页数:27
相关论文
共 50 条
  • [41] A participatory data-centric approach to AI Ethics by Design
    Gerdes, Anne
    [J]. APPLIED ARTIFICIAL INTELLIGENCE, 2022, 36 (01)
  • [42] A data-centric approach to high-level synthesis
    Tarafdar, S
    Leeser, M
    [J]. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2000, 19 (11) : 1251 - 1267
  • [43] Data-Centric Optimization Approach for Small, Imbalanced Datasets
    Tanov, Vladislav
    [J]. JOURNAL OF INFORMATION AND ORGANIZATIONAL SCIENCES, 2023, 47 (01) : 167 - 177
  • [44] A data-centric approach for scalable state machine replication
    Chockler, G
    Malkhi, D
    Dolev, D
    [J]. FUTURE DIRECTIONS IN DISTRIBUTED COMPUTING: RESEARCH AND POSITION PAPERS, 2003, 2584 : 159 - 163
  • [45] Reliability evaluation of individual predictions: a data-centric approach
    Shahbazi, Nima
    Asudeh, Abolfazl
    [J]. VLDB JOURNAL, 2024, 33 (04): : 1203 - 1230
  • [46] Dynamic Load Balancing in Cloud A Data-Centric Approach
    Dasoriya, Rayan
    Kotadiya, Purvi
    Arya, Garima
    Nayak, Priyanshu
    Mistry, Kamal
    [J]. 2017 INTERNATIONAL CONFERENCE ON NETWORKS & ADVANCES IN COMPUTATIONAL TECHNOLOGIES (NETACT), 2017, : 162 - 166
  • [47] Identification of the Barriers to Data-Centric Approach in the Construction Industry
    Karji, Ali
    Messner, John
    Leicht, Robert
    McComb, Christopher
    [J]. CONSTRUCTION RESEARCH CONGRESS 2022: PROJECT MANAGEMENT AND DELIVERY, CONTRACTS, AND DESIGN AND MATERIALS, 2022, : 1002 - 1011
  • [48] Optimal Input Signal Design for Data-Centric Estimation Methods
    Deshpande, Sunil
    Rivera, Daniel E.
    [J]. 2013 AMERICAN CONTROL CONFERENCE (ACC), 2013, : 3924 - 3929
  • [49] Data-Centric Refinement of Information Flow Analysis of Database Applications
    Alam, Md. Imran
    Halder, Raju
    [J]. SECURITY IN COMPUTING AND COMMUNICATIONS (SSCC 2015), 2015, 536 : 506 - 518
  • [50] A Secure Decentralized Data-Centric Information Infrastructure for Smart Grid
    Kim, Young-Jin
    Thottan, Marina
    Kolesnikov, Vladimir
    Lee, Wonsuck
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2010, 48 (11) : 58 - 65