Defining and computing a value based cyber-security measure

被引:0
|
作者
Anis Ben Aissa
Robert K. Abercrombie
Frederick T. Sheldon
Ali Mili
机构
[1] University of Tunis El Manar,Faculty of Sciences of Tunisia
[2] Oak Ridge National Laboratory,College of Computing Sciences
[3] New Jersey Institute of Technology,undefined
关键词
Cyber security metrics; Risk management; Information security; Algorithms; Measurement; Performance; Design; Economics; Reliability; Experimentation; Security; Theory; Verification;
D O I
暂无
中图分类号
学科分类号
摘要
In earlier work, we presented a value based measure of cybersecurity that quantifies the security of a system in concrete terms, specifically, in terms of how much each system stakeholder stands to lose (in dollars per hour of operation) as a result of security threats and system vulnerabilities; our metric varies according to the stakes that each stakeholder has in meeting each security requirement. In this paper, we discuss the specification and design of a system that collects, updates, and maintains all the information that pertains to estimating our cybersecurity measure, and offers stakeholders quantitative means to make security-related decisions.
引用
收藏
页码:433 / 453
页数:20
相关论文
共 50 条
  • [1] Defining and computing a value based cyber-security measure
    Ben Aissa, Anis
    Abercrombie, Robert K.
    Sheldon, Frederick T.
    Mili, Ali
    [J]. INFORMATION SYSTEMS AND E-BUSINESS MANAGEMENT, 2012, 10 (04) : 433 - 453
  • [2] Scalable Cyber-Security for Terabit Cloud Computing
    Ros-Giralt, Jordi
    Szilagyi, Peter
    Lethin, Richard
    [J]. 2012 SC COMPANION: HIGH PERFORMANCE COMPUTING, NETWORKING, STORAGE AND ANALYSIS (SCC), 2012, : 1607 - 1616
  • [3] Is quantum computing becoming relevant to cyber-security?
    Keplinger K.
    [J]. 2018, Elsevier Ltd (2018) : 16 - 19
  • [4] State-of-The-Art of Cloud Computing Cyber-Security
    Bennasar, Hanane
    Essaaidi, Mohammad
    Bendahmane, Ahmed
    Ben-othman, Jalel
    [J]. PROCEEDINGS OF 2015 THIRD IEEE WORLD CONFERENCE ON COMPLEX SYSTEMS (WCCS), 2015,
  • [5] Social Cyber-Security
    Carley, Kathleen M.
    Cervone, Guido
    Agarwal, Nitin
    Liu, Huan
    [J]. SOCIAL, CULTURAL, AND BEHAVIORAL MODELING, SBP-BRIMS 2018, 2018, 10899 : 389 - 394
  • [6] REGULATING CYBER-SECURITY
    Sales, Nathan Alexander
    [J]. NORTHWESTERN UNIVERSITY LAW REVIEW, 2013, 107 (04) : 1503 - 1568
  • [7] An Overview of the State-of-the-Art of Cloud Computing Cyber-Security
    Bennasar, H.
    Bendahmane, A.
    Essaaidi, M.
    [J]. CODES, CRYPTOLOGY AND INFORMATION SECURITY, C2SI 2017, 2017, 10194 : 56 - 67
  • [8] Cyber-security threat
    Klebba, Jesse
    [J]. CHEMISTRY & INDUSTRY, 2017, 81 (10) : 9 - 9
  • [9] Cyber-Security and Privacy
    Lopez, Javier
    Martinelli, Fabio
    Samarati, Pierangela
    [J]. ERCIM NEWS, 2015, (100): : 10 - 11
  • [10] Trusted Computing Initiative on the Spectrum of EU Cyber-Security Legal Framework
    Danidou, Yianna
    [J]. EU INTERNET LAW IN THE DIGITAL ERA: REGULATION AND ENFORCEMENT, 2020, : 277 - 296