Quantitative Assessment of Cybersecurity Risks for Mitigating Data Breaches in Business Systems

被引:13
作者
Algarni, Abdullah M. [1 ]
Thayananthan, Vijey [1 ]
Malaiya, Yashwant K. [2 ]
机构
[1] King Abdulaziz Univ, Dept Comp Sci, Jeddah 21589, Saudi Arabia
[2] Colorado State Univ, Dept Comp Sci, Ft Collins, CO 80523 USA
来源
APPLIED SCIENCES-BASEL | 2021年 / 11卷 / 08期
关键词
data breach cost; data breach probability; cybersecurity; risk assessment; risk management; VULNERABILITY; SECURITY; COST;
D O I
10.3390/app11083678
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
The evaluation of data breaches and cybersecurity risks has not yet been formally addressed in modern business systems. There has been a tremendous increase in the generation, usage and consumption of industrial and business data as a result of smart and computational intensive software systems. This has resulted in an increase in the attack surface of these cyber systems. Consequently, there has been a consequent increase in the associated cybersecurity risks. However, no significant studies have been conducted that examine, compare, and evaluate the approaches used by the risk calculators to investigate the data breaches. The development of an efficient cybersecurity solution allows us to mitigate the data breaches threatened by the cybersecurity risks such as cyber-attacks against database storage, processing and management. In this paper, we develop a comprehensive, formal model that estimates the two components of security risks: breach cost and the likelihood of a data breach within 12 months. The data used in this model are taken from the industrial business report, which provides the necessary information collected and the calculators developed by the major organizations in the field. This model integrated with the cybersecurity solution uses consolidated factors that have a significant impact on the data breach risk. We propose mathematical models of how the factors impact the cost and the likelihood. These models allow us to conclude that results obtained through the models mitigate the data breaches in the potential and future business system dynamically.
引用
收藏
页数:23
相关论文
共 41 条
[1]   Privacy-preserving techniques of genomic data-a survey [J].
Al Aziz, Md Momin ;
Sadat, Md Nazmus ;
Alhadidi, Dima ;
Wang, Shuang ;
Jiang, Xiaoqian ;
Brown, Cheryl L. ;
Mohammed, Noman .
BRIEFINGS IN BIOINFORMATICS, 2019, 20 (03) :887-895
[2]  
Algarni AM, 2016, PROCEEDINGS OF 2016 2ND INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT (ICIM2016)
[3]   Application of vulnerability discovery models to major operating systems [J].
Alhazmi, Omar H. ;
Malaiya, Yashwant K. .
IEEE TRANSACTIONS ON RELIABILITY, 2008, 57 (01) :14-22
[4]  
[Anonymous], 2014, Cost of Data Breach Study: Global Analysis
[5]  
[Anonymous], 2015, "Data breaches may cost less than the security to prevent them"
[6]  
[Anonymous], 2015, Cost of data breach study: Global analysis
[7]  
[Anonymous], 2013, 2013 COST DAT BREACH
[8]  
[Anonymous], 2019, HIPAA Journal
[9]  
[Anonymous], 1999, USCCSE99510
[10]  
Aroonvatanaporn P., 2012, Proceedings 2012 International Conference on Software and System Process (ICSSP 2012), P28, DOI 10.1109/ICSSP.2012.6225977