A Multidimensional Approach Towards a Quantitative Assessment of Security Threats

被引:17
作者
Jouini, Mouna [1 ]
Rabai, Latifa Ben Arfa [1 ,2 ]
Khedri, Ridha [3 ]
机构
[1] Tunis Univ, Inst Super Gest Tunis, Tunis, Tunisia
[2] Tunis El Manar Univ, Dept Comp Sci, LIPAH, Fac Sci Tunis, Tunis, Tunisia
[3] McMaster Univ, Dept Comp & Software, Hamilton, ON, Canada
来源
6TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT-2015), THE 5TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2015) | 2015年 / 52卷
关键词
Information security; threat classification; security dimension; security perspective; security risk assessment; security threats; multidimensional mean failure cost;
D O I
10.1016/j.procs.2015.05.024
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Information security is the most challenging aspect of information processing. Organizations, governments, and individuals are facing many information security risks. These risks can cause serious damages that might lead to significant financial losses, breach of the confidentiality of sensitive information, or loss of integrity or availability of sensitive data. To facilitate effective protection of information, a better identification, understanding, and assessment of security threat and their characteristics are crucial for system security managers. In order to define and then assess security threats, we propose a new threat identification approach on which we build a quantitative security risk model for information systems. The proposed model is systematic, extendable, and modular. The aim is to help managers accurately assess security threat in an incremental and comprehensive way. (C) 2015 The Authors. Published by Elsevier B.V. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
引用
收藏
页码:507 / 514
页数:8
相关论文
共 18 条
  • [1] Adrian Baldwin, 2011, 10 WORKSH EC INF SEC
  • [2] Alhabeeb Mohammed, 2010, Proceedings of the 2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops (WAINA 2010), P208, DOI 10.1109/WAINA.2010.39
  • [3] Alhakami W, 2014, INT J ADV COMPUTER S, V5
  • [4] Avizienis A, 2004, INT FED INFO PROC, V156, P91
  • [5] Quantifying security threats and their potential impacts: a case study
    Ben Aissa, Anis
    Abercrombie, Robert K.
    Sheldon, Frederick T.
    Mili, Ali
    [J]. INNOVATIONS IN SYSTEMS AND SOFTWARE ENGINEERING, 2010, 6 (04) : 269 - 281
  • [6] Classification and trend analysis of threats origins to the security of power systems
    Bompard, Ettore
    Huang, Tao
    Wu, Yingjun
    Cremenescu, Mihai
    [J]. INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS, 2013, 50 : 50 - 64
  • [7] Caralli Richard A., 2007, TECHNICAL REPORT
  • [8] A security risk analysis model for information systems: Causal relationships of risk factors and vulnerability propagation analysis
    Feng, Nan
    Wang, Harry Jiannan
    Li, Minqiang
    [J]. INFORMATION SCIENCES, 2014, 256 : 57 - 73
  • [9] Gordon Lawrence A, 2008, CSI FBI COMPUTER CRI
  • [10] Jian T, 2012, SCALABLE ARCHITECTUR