2012
DOI: 10.1080/13623079.2011.587206
|View full text |Cite
|
Sign up to set email alerts
|

Evaluation of complex security scenarios using defense trees and economic indexes

Abstract: In this article, we present a mixed qualitative and quantitative approach for evaluation of information technology (IT) security investments. For this purpose, we model security scenarios by using defense trees, an extension of attack trees with countermeasures and we use economic quantitative indexes for computing the defender's return on security investment and the attacker's return on attack. We show how our approach can be used to evaluate economic profitability of countermeasures and their deterrent effec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 18 publications
(7 citation statements)
references
References 19 publications
0
7
0
Order By: Relevance
“…1. The AT metamodel (ATMM), unifies several extensions of the attack tree formalism including traditional attack trees [25,31], attack-defense trees [18], defense trees [6], etc. It consists of two parts: the Structure metamodel and the Values metamodel.…”
Section: Metamodels For Attack Tree Analysismentioning
confidence: 99%
“…1. The AT metamodel (ATMM), unifies several extensions of the attack tree formalism including traditional attack trees [25,31], attack-defense trees [18], defense trees [6], etc. It consists of two parts: the Structure metamodel and the Values metamodel.…”
Section: Metamodels For Attack Tree Analysismentioning
confidence: 99%
“…Moreover, the effects that IT security investments have on reducing the incidence of data security breaches over time were analyzed (Angst et al 2017). Methods and models for evaluation have been suggested, for instance, by Bistarelli et al (2012), Bodin et al (2005), Cavusoglu et al (2004), Chou et al (2006), Cremonini & Martini (2005), Jing (2009), Locher (2005), Sheen (2010) and Wang et al (2011). Several metrics have been introduced to measure improvements in the overall organizational performance rooted in information security investments, for example, metrics that quantify the Return On Security Investment (ROSI), e.g., Anderson et al (2008), Gordon & Loeb (2002a), the Internal Rate of Return (IRR), e.g., Buck et al (2008) and Wawrzyniak (2006), Net Present Value (NPV), e.g., Eisenga et al (2012) and Sheen (2010), Annual Loss Expectancy (ALE), e.g., Cremonini & Martini (2005) and Tanaka et al (2005) or Cumulated Abnormal Return (CAR), e.g., Andoh-Baidoo & Osei-Bryson (2007) and Campbell et al (2003).…”
Section: Research On Information Security Investmentmentioning
confidence: 99%
“…Due to the complexity and time expenditure of evaluating information security investment decisions, evaluation processes are not applied in practice which contravenes the academic literature providing several methods, models and processes for evaluation (Barnard & von Solms 2000;Bistarelli et al 2012;Bodin et al 2005;Cremonini & Martini 2005;Eloff & Von Solms 2000;Knapp et al 2009;Vroom & von Solms 2004). Academia provides several metrics (Jansen 2011;…”
Section: Metrics and Evaluation Processes Used To Measure The Changesmentioning
confidence: 99%
“…Technically, it is referred to as 'vulnerability', and it outlines the ease of rupturing a system's security state observed from a defensive point of view. For instance, defense trees [41], [42], the CVSS paradigm [43]- [45], the change-point detection evaluation approach [46], etc., have been used to derive metric values used to represent system susceptibilities to potential threats and attacks. Similarly, the knowledge of these vulnerabilities can help the easy identification and appropriation of security controls and efforts.…”
Section: A) Security Dimension (L1 Scoping)mentioning
confidence: 99%