2012 IEEE International Systems Conference SysCon 2012 2012
DOI: 10.1109/syscon.2012.6189500
|View full text |Cite
|
Sign up to set email alerts
|

CIAM: A data-driven approach for selecting and prioritizing security controls

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
10
0

Year Published

2012
2012
2019
2019

Publication Types

Select...
3
2
1

Relationship

2
4

Authors

Journals

citations
Cited by 12 publications
(10 citation statements)
references
References 4 publications
0
10
0
Order By: Relevance
“… Business impact/disruption, anticipated loss, profit reduction, fines, reputation, decline in stock price, damage [17]- [23]  Risk tolerance [12], [19], [24]; Budget [19]  Legal and regulatory [22]  Self-imposed constraints [22] Asset  Importance/value [13], [24]- [27]  Assessed risk [12], [24]  Probability of breach, event, or successful attack [13], [24], [26], [28], [29] Threat  Anticipated [25], [27], [30], [31]  Most significant [25]  Residual risk [23], [32]; Incident data [17] Control  Cost, general [12], [13], [30], [32], [18], [20]- [23], [26]- [28]  Purchase/setup [17], [24], [25], [33]- [35]  Number of controls as a proxy for cost [36]  Difficulty of implementation [25]  Operation, training, and maintenance cost [17], [24], [25],…”
Section: Organizationalmentioning
confidence: 99%
“… Business impact/disruption, anticipated loss, profit reduction, fines, reputation, decline in stock price, damage [17]- [23]  Risk tolerance [12], [19], [24]; Budget [19]  Legal and regulatory [22]  Self-imposed constraints [22] Asset  Importance/value [13], [24]- [27]  Assessed risk [12], [24]  Probability of breach, event, or successful attack [13], [24], [26], [28], [29] Threat  Anticipated [25], [27], [30], [31]  Most significant [25]  Residual risk [23], [32]; Incident data [17] Control  Cost, general [12], [13], [30], [32], [18], [20]- [23], [26]- [28]  Purchase/setup [17], [24], [25], [33]- [35]  Number of controls as a proxy for cost [36]  Difficulty of implementation [25]  Operation, training, and maintenance cost [17], [24], [25],…”
Section: Organizationalmentioning
confidence: 99%
“…Table 1 presents the three variants of MBA. The first variant is the cyber investment analysis methodology (CIAM) [5], which considers risk and mitigation actions at the enterprise level by analyzing forensic data on attacks, vulnerabilities, CVSS scores, protection strategies and protection costs to estimate an optimal investment level by protection type. The second is network mission assurance (NMA) [2], which focuses on the availability of network bandwidth and how cyber attacks that impact network capacity can affect mission.…”
Section: Related Workmentioning
confidence: 99%
“…Llanso [9] introduces CIAM -an approach that provides an initial prioritization of security controls. His approach uses data related to security incidents, vulnerabilities, business impact, and security control costs.…”
Section: Related Workmentioning
confidence: 99%
“…Llanso [9] introduces an approach for selecting and prioritizing security controls (in the terminology of this paper, we use the term 'security mechanism' instead of the 'security control' because the latter term could indicate the usage of NIST 800-30 security controls). First, he computes weights of these controls, using three component weights -Prevention, Detection and Response (P/D/R) against an attack.…”
Section: Security Mechanism Weightingmentioning
confidence: 99%
See 1 more Smart Citation