Intelligence in security countermeasures selection

被引:1
|
作者
Tamjidi, Sina [1 ]
Shameli-Sendi, Alireza [1 ]
机构
[1] Shahid Beheshti Univ SBU, Fac Comp Sci & Engn, Tehran, Iran
关键词
Intelligence; Risk; Vulnerability; Business Process; Countermeasure;
D O I
10.1007/s11416-022-00439-w
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Identifying security risks in organizations and also determining their severity in order to select appropriate security countermeasures is of great importance in organizations. In the last two decades, a lot of work has been done to increase the accuracy of risk impact calculation as well as the right selection of countermeasures. Also, a variety of work has been proposed to select combined countermeasures instead of single ones. So there is a challenge to balance the cost of security with the improvement of the defense system. In this paper, a dataset that includes the organization business processes, security data, assets, vulnerabilities, and related security countermeasures is suggested for the first time. In the previous work, this chain of information from the content of the organization, which is definitely different from another organization, has not been considered for the analysis of the performance of countermeasures (success or failure). Based on the results of the countermeasures during the organization's lifetime, more efficient countermeasures can be suggested for new or existing risks. Therefore, by intelligently selecting the security countermeasures presented in this paper, organizations will be able to identify ineffective countermeasures and prevent them from being re-selected to counter attackers. In this way, we can make our organization more resilient to attackers over time.
引用
收藏
页码:137 / 148
页数:12
相关论文
共 50 条
  • [21] SELECTION OF TRAFFIC ACCIDENT COUNTERMEASURES
    SENEVIRATNE, PN
    SENEVIRATNE, AP
    CANADIAN JOURNAL OF CIVIL ENGINEERING, 1988, 15 (02) : 145 - 151
  • [22] A wider perspective on the selection of countermeasures
    Voigt, G
    Eged, K
    Hilton, J
    Howard, BJ
    Kis, Z
    Nisbet, AF
    Oughton, DH
    Rafferty, B
    Salt, CA
    Smith, JT
    Vandenhove, H
    RADIATION PROTECTION DOSIMETRY, 2000, 92 (1-3) : 45 - 48
  • [23] Economic Security: New Threats and Countermeasures
    Tsiklauri, Viktoria
    Tkacheva, Elizabeth
    Piyaltsev, Alexander
    Ukrainceva, Irina
    EDUCATION EXCELLENCE AND INNOVATION MANAGEMENT: A 2025 VISION TO SUSTAIN ECONOMIC DEVELOPMENT DURING GLOBAL CHALLENGES, 2020, : 9528 - 9537
  • [24] Security countermeasures in the cyber-world
    Bendovschi, Andreea
    Al-Nemrat, Ameer
    2016 IEEE INTERNATIONAL CONFERENCE ON CYBERCRIME AND COMPUTER FORENSIC (ICCCF), 2016,
  • [25] Grid Security Loopholes with Proposed Countermeasures
    Azeez, Nureni Ayofe
    Iyamu, Tiko
    Venter, Isabella M.
    COMPUTER AND INFORMATION SCIENCES II, 2012, : 411 - 418
  • [26] SCADA Systems: Security Concerns and Countermeasures
    Salvador, Lourdes Cecilia Ruiz
    Nguyen Huu Phuoc Dai
    Zoltan, Rajnai
    2023 IEEE 21ST WORLD SYMPOSIUM ON APPLIED MACHINE INTELLIGENCE AND INFORMATICS, SAMI, 2023, : 251 - 254
  • [27] A review of security risks and countermeasures in containers
    Martínez-Magdaleno, Samuel
    Morales-Rocha, Victor
    Parra, Ramón
    International Journal of Security and Networks, 2021, 16 (03) : 183 - 190
  • [28] CounterMeasures: A Game for Teaching Computer Security
    Jordan, Craig
    Knapp, Matt
    Mitchell, Dan
    Claypool, Mark
    Fisler, Kathi
    2011 10TH ANNUAL WORKSHOP ON NETWORK AND SYSTEMS SUPPORT FOR GAMES (NETGAMES 2011), 2011,
  • [29] Security Vulnerabilities of SGX and Countermeasures: A Survey
    Fei, Shufan
    Yan, Zheng
    Ding, Wenxiu
    Xie, Haomeng
    ACM COMPUTING SURVEYS, 2021, 54 (06)
  • [30] Security challenges and countermeasures in WLANs.
    Park, JS
    Nanda, A
    Howison, J
    CCCT 2003, VOL 5, PROCEEDINGS: COMPUTER, COMMUNICATION AND CONTROL TECHNOLOGIES: II, 2003, : 347 - 352