Managing Cybersecurity Risk Using Threat Based Methodology for Evaluation of Cybersecurity Architectures

被引:0
作者
Bokan, Branko [1 ]
Santos, Joost [1 ]
机构
[1] George Washington Univ, Washington, DC 20052 USA
来源
2021 SYSTEMS AND INFORMATION ENGINEERING DESIGN SYMPOSIUM (IEEE SIEDS 2021) | 2021年
关键词
threat modeling; cybersecurity architecture; cybersecurity capabilities; assessment; evaluation; cyber threat framework; risk; risk management;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To manage limited resources available to protect against cybersecurity threats, organizations must use risk management approach to prioritize investments in protection capabilities. Currently, there is no commonly accepted methodology for cybersecurity professionals that considers one of the key elements of risk function - threat landscape - to identify gaps (blinds spots) where cybersecurity protections do not exist and where future investments are needed. This paper discusses a new, threat-based approach for evaluation of cybersecurity architectures that allows organizations to look at their cybersecurity protections from the standpoint of an adversary. The approach is based on a methodology developed by the Department of Defense and further expanded by the Department of Homeland Security. The threat-based approach uses a cyber threat framework to enumerate all threat actions previously observed in the wild and scores protections (cybersecurity architectural capabilities) against each threat action for their ability to: a) detect; b) protect against; and c) help in recovery from the threat action. The answers form a matrix called capability coverage map - a visual representation of protections coverage, gaps, and overlaps against threats. To allow for prioritization, threat actions can be organized in a threat heat map - a visual representation of threat actions' prevalence and maneuverability that can be overlaid on top of a coverage map. The paper demonstrates a new threat modeling methodology and recommends future research to establish a decision-making framework for designing cybersecurity architectures (capability portfolios) that maximize protections (described as coverage in terms of protect, detect, and respond functions) against known cybersecurity threats.
引用
收藏
页码:216 / 221
页数:6
相关论文
共 28 条
[1]  
[Anonymous], 2020, MERRIAM WEBSTER
[2]  
[Anonymous], 2019, NIST chemistry webbook, V2, DOI DOI 10.18434/T4D303
[3]  
[Anonymous], 2015, CNSSI4009
[4]  
[Anonymous], 2019, Annual Report 2019
[5]  
[Anonymous], Establish and Maintain Infrastructure, Techniques
[6]  
Aven T., 2018, SOC RISK ANAL GLOSSA
[7]   The risk concept-historical and recent development trends [J].
Aven, Terje .
RELIABILITY ENGINEERING & SYSTEM SAFETY, 2012, 99 :33-44
[8]   RISK ANALYSIS AND RISK MANAGEMENT - AN HISTORICAL-PERSPECTIVE [J].
COVELLO, VT ;
MUMPOWER, J .
RISK ANALYSIS, 1985, 5 (02) :103-120
[9]  
Department of Homeland Security, 2018, FY 2018 ICE ENF REM
[10]  
DigitalGuiardian, 2017, INF SEC IND