An Application of Probabilistic Risk Assessment to Information Security Audit

被引:0
作者
Satoh, Naoki [1 ]
Kumamoto, Hiromitsu [1 ]
机构
[1] Kyoto Univ, Grad Sch Informat, Sakyo Ku, 36-1 Yoshida Honmachi, Kyoto 6068501, Japan
来源
AIC '09: PROCEEDINGS OF THE 9TH WSEAS INTERNATIONAL CONFERENCE ON APPLIED INFORMATICS AND COMMUNICATIONS: RECENT ADVANCES IN APPLIED INFORMAT AND COMMUNICATIONS | 2009年
关键词
Information Security; Audit-Probabilistic Risk Assessment; Scenario; Defenseless Time Span; Occurrence Frequency;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
After the information security audit, the auditor commonly points out the importance of information assets, the vulnerability of the audited information system, and the need of countermeasures. On such an occasion, the audited often ask the auditor for the quantitative assessment of the risk so that they can take specific measures. Nevertheless, in reality, the auditor can hardly meet this requirement because they do not have any appropriate methods to assess the risk quantitatively and systematically. Therefore, this paper proposes the approach that makes it possible to identify the scenarios of information security accidents systematically, to assess the risk of the occurrence of the scenario quantitatively, and to point out the importance of taking countermeasures by incorporating Probabilistic Risk Assessment in information security audit. For the concrete description and explanation of this approach, this paper takes the case of the audit of password management as an example. By enumerating the possible scenarios that indicate how initiating events, the vulnerability of mitigation systems, and the failures of operations can allow illegal accesses to the information assets, this paper shows that it is possible to assess the security risks by the pair of defenseless time span and its occurrence frequency of each scenario. Finally, since the parameters necessary for risk quantification such as the occurrence frequency of password theft, the probability of theft detection, and the probability of taking countermeasure after the theft have uncertainty, the uncertainty of the occurrence of the scenario itself is assessed by propagating the incompleteness of the knowledge of these parameters with random digits.
引用
收藏
页码:436 / +
页数:2
相关论文
共 10 条
[1]  
[Anonymous], 2004, P INT INFR SURV WORK
[2]  
ASME, 2002, RAS2002 ASME
[3]  
*ISO, 2002, 13335 TR ISO
[4]  
*JAP INF PROC DEV, 2000, AUD GUID PRIV MARK S
[5]  
*JAP INF PROC DEV, 2005, ISMS US GUID COMPL I
[6]  
*MIN EC TRAD IND, 2003, INF SEC AUD CRIT VER
[7]  
*MIN EC TRAD IND, 2004, STAND SYST AUD
[8]  
*MIN INT AF COMM, 2008, WHIT PAP TEL 2008 GY
[9]  
TABUCHI H, 2003, INFORM SECURITY RISK
[10]  
TSUMORI S, 2005, TOTAL RISK MANAGEMEN