A Scenario-Based Information Security Risk Evaluation Method

被引:1
|
作者
Ban, Xiaofang [1 ]
Tong, Xin [1 ]
机构
[1] China Informat Technol Secur Evaluat Ctr, Syst Evaluat Div, Beijing, Peoples R China
关键词
risk evaluation; risk scenario; business impact; vulnerabilities; asset value chain; risk integration;
D O I
10.14257/ijsia.2014.8.5.03
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Risk evaluation is the core process of information security risk management. An effective risk evaluation can protect organizations and maintain their abilities to carry out missions and activities against threats as well as helping to implement controls and safeguards that are actually needed. While the traditional information security risk evaluation approaches are lack of granular analysis and clear expression of security characteristics of risk, such as the possibility, attack path, and business impact. This paper presents the scenario-based information security risk evaluation method, based on the thought of Advanced Persistent Threat (APT) attack, by constructing risk scenario, evaluate information system security risk status. The separation analysis of the technical impact and business impact contribute to the technicians and business decision makers to grasp system risk status from their respective responsibilities. In the end of the paper, we propose a practical risk scenario construction example, which provides scientific and effective guidance for the preparation of a risk evaluation report.
引用
收藏
页码:21 / 30
页数:10
相关论文
共 50 条
  • [1] Scenario-based risk evaluation
    Ruodu Wang
    Johanna F. Ziegel
    Finance and Stochastics, 2021, 25 : 725 - 756
  • [2] Scenario-based risk evaluation
    Wang, Ruodu
    Ziegel, Johanna F.
    FINANCE AND STOCHASTICS, 2021, 25 (04) : 725 - 756
  • [3] A Scenario-Based Framework for the Security Evaluation of Software Architecture
    Alkussayer, Abdulaziz
    Allen, William H.
    PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 5, 2010, : 687 - 695
  • [4] Threat scenario-based security risk analysis using use case modeling in information systems
    Kim, Young-Gab
    Cha, Sungdeok
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (03) : 293 - 300
  • [5] A scenario-based approach to airport security
    Cole, Mara
    Kuhlmann, Andreas
    FUTURES, 2012, 44 (04) : 319 - 327
  • [6] Scenario-based assessment of future food security
    Wu Wenbin
    Tang Huajun
    Yang Peng
    You Liangzhi
    Zhou Qingbo
    Chen Zhongxin
    Shibasaki, Ryosuke
    JOURNAL OF GEOGRAPHICAL SCIENCES, 2011, 21 (01) : 3 - 17
  • [7] Scenario-based assessment of future food security
    Wenbin Wu
    Huajun Tang
    Peng Yang
    Liangzhi You
    Qingbo Zhou
    Zhongxin Chen
    Ryosuke Shibasaki
    Journal of Geographical Sciences, 2011, 21 : 3 - 17
  • [8] A Scenario-Based FMEA Method and its Evaluation in a Railway Context
    Issad, Melissa
    Kloul, Leila
    Rauzy, Antoine
    2017 ANNUAL RELIABILITY AND MAINTAINABILITY SYMPOSIUM, 2017,
  • [9] The effects of scenario-based risk information on perceptions of susceptibility to Chlamydia and HIV
    Mevissen, Fraukje E. F.
    Ruiter, Rob A. C.
    Meertens, Ree M.
    Schaalma, Herman P.
    PSYCHOLOGY & HEALTH, 2010, 25 (10) : 1161 - 1174
  • [10] Scenario-Based Software Reliability Testing and Evaluation of Complex Information Systems
    Wu, Lijin
    He, Wei
    Liu, Bojiang
    Han, Xinyu
    Tang, Longli
    2018 IEEE 18TH INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY COMPANION (QRS-C), 2018, : 73 - 78