Threat Scenario Dependency-Based Model of Information Security Risk Analysis

被引:0
|
作者
Rahmad, Basuki [1 ]
Supangkat, Suhono H. [2 ]
Sembiring, Jaka [2 ]
Surendro, Kridanto [2 ]
机构
[1] Inst Teknol Bandung, Sch Elect Engn & Informat STEI, Bandung, Indonesia
[2] Inst Teknol Bandung, STEI, Bandung, Indonesia
来源
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY | 2010年 / 10卷 / 08期
关键词
Security Risk Analysis; Threat Scenario Dependency; Bayesian Network;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Asset dependency paradigm can help us to represent the phenomena of risk dependency on the relevant assets. This paper is aimed to propose the information security risk analysis model, based on the threat-scenario dependency paradigm to represent the asset dependency. Two current approaches of asset dependency representation, threat dependency and security dimension dependency, still have limitations on consistency and the formulation of control's role to reduce the risk. The proposed model can improve the consistency of threats mapping and the control's roles to reduce the likelihood and degradation value of threat.
引用
收藏
页码:93 / 102
页数:10
相关论文
共 50 条
  • [41] Arabic sentiment analysis using dependency-based rules and deep neural networks
    Diwali, Arwa
    Dashtipour, Kia
    Saeedi, Kawther
    Gogate, Mandar
    Cambria, Erik
    Hussain, Amir
    APPLIED SOFT COMPUTING, 2022, 127
  • [42] A Test of Structured Threat Descriptions for Information Security Risk Assessments
    Karlzen, Henrik
    Bengtsson, Johan
    Hallberg, Jonas
    ICISSP: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2018, : 469 - 476
  • [43] A Threat Table Based Assessment of Information Security in Telemedicine
    Pendergrass, John C.
    Heart, Karen
    Ranganathan, C.
    Venkatakrishnan, V. N.
    INTERNATIONAL JOURNAL OF HEALTHCARE INFORMATION SYSTEMS AND INFORMATICS, 2014, 9 (04) : 20 - 31
  • [44] The Information Security Risk Assessment Model Based on GA - BP
    Song, Yongqiang
    Shen, Yongjun
    Zhang, Guidong
    Hu, Yuming
    PROCEEDINGS OF 2016 IEEE 7TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2016), 2016, : 119 - 122
  • [45] Knowledge information model of the scenario analysis
    Pankratova, N.D.
    Malafeeva, L.Yu.
    Journal of Automation and Information Sciences, 2014, 46 (02) : 56 - 66
  • [46] Threat risk analysis for cloud security based on Attack-Defense Trees
    Wang, Ping
    Lin, Hui-Tang
    Wang, Tzu Chia
    Lin, Wen-Hui
    Kuo, Pu-Tsun
    International Journal of Advancements in Computing Technology, 2012, 4 (17) : 607 - 617
  • [47] Concept-Level Sentiment Analysis with Dependency-Based Semantic Parsing: A Novel Approach
    Basant Agarwal
    Soujanya Poria
    Namita Mittal
    Alexander Gelbukh
    Amir Hussain
    Cognitive Computation, 2015, 7 : 487 - 499
  • [48] Efficient band reduction for hyperspectral imaging with dependency-based segmented principal component analysis
    Ali, U. A. Md. Ehsan
    Maniamfu, Pavodi
    Kameyama, Keisuke
    INTERNATIONAL JOURNAL OF REMOTE SENSING, 2024,
  • [49] Concept-Level Sentiment Analysis with Dependency-Based Semantic Parsing: A Novel Approach
    Agarwal, Basant
    Poria, Soujanya
    Mittal, Namita
    Gelbukh, Alexander
    Hussain, Amir
    COGNITIVE COMPUTATION, 2015, 7 (04) : 487 - 499
  • [50] Scenario-based threat detection and attack analysis
    Hsiu, PC
    Kuo, CF
    Kuo, TW
    Juan, EYT
    39TH ANNUAL 2005 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2005, : 279 - 282