2013
DOI: 10.5120/11672-7280
|View full text |Cite
|
Sign up to set email alerts
|

A Formal Attack Centric Framework Highlighting Expected Losses of an Information Security Breach

Abstract: From the beginning of the different approaches for analyzing and assessing the information related risk affecting organization, the two factors deriving risk are the damages or losses incurred to the organization and the probability of occurring of those risk incidents. Many qualitative and quantitative models have been proposed to estimate the above two factors considering the asset centric and software centric approaches. This paper proposes an attack centric framework that considers approaches of an attacke… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 2 publications
0
1
0
Order By: Relevance
“…Prior works formalized security problems using game theory (e.g., FLIPIT [41], [24]), "weird machines" [10], attack trees [43], Markov models [40], and other methods. Prior notions of attacker quality include O-complexity [9], expected information loss [38], or success probability [30], which is similar to our concept of ∀ versus ∃-attackers. Attacker synthesis work exists in cyber-physical systems [33,5,20,26,30].…”
Section: Related Workmentioning
confidence: 99%
“…Prior works formalized security problems using game theory (e.g., FLIPIT [41], [24]), "weird machines" [10], attack trees [43], Markov models [40], and other methods. Prior notions of attacker quality include O-complexity [9], expected information loss [38], or success probability [30], which is similar to our concept of ∀ versus ∃-attackers. Attacker synthesis work exists in cyber-physical systems [33,5,20,26,30].…”
Section: Related Workmentioning
confidence: 99%