2017
DOI: 10.4108/eai.29-11-2017.153389
|View full text |Cite
|
Sign up to set email alerts
|

Maximizing Security Management Performance and Decisions with the MFC Cyber Security Model: e- learning case study

Abstract: The Mean failure Cost (MFC) is a cascade of linear models that quantify security threats by taking into consideration the system's stakeholders, security requirements, architectural components and threats. This quantitative cyber security model monetizes system's security in terms of cost which may be lost due to security failure. The lack of quantitative security models in security decision making is a way to discover strengths and uniqueness of the MFC cyber security model. This paper intends to extend this … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
2
1
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 9 publications
0
2
0
Order By: Relevance
“…Here in Ethiopia, both private and public sectors are highly dependent on technological solutions (buying more tools and techniques) to protect their information and technological infrastructures. However, since the width and depth of the cyber-attack dimension is growing faster than ever, technology alone can provide some help but will not be a possible solution for the fastest growing cyber-attack scenarios [14,15]. To this end, cybersecurity is well addressed by designing and implementing appropriate sets of governance, management, processes, controls, policies, procedures, and organizational security structures to make sure that security and business objectives are met without having security problems [16][17][18].…”
Section: Introductionmentioning
confidence: 99%
“…Here in Ethiopia, both private and public sectors are highly dependent on technological solutions (buying more tools and techniques) to protect their information and technological infrastructures. However, since the width and depth of the cyber-attack dimension is growing faster than ever, technology alone can provide some help but will not be a possible solution for the fastest growing cyber-attack scenarios [14,15]. To this end, cybersecurity is well addressed by designing and implementing appropriate sets of governance, management, processes, controls, policies, procedures, and organizational security structures to make sure that security and business objectives are met without having security problems [16][17][18].…”
Section: Introductionmentioning
confidence: 99%
“…Here in Ethiopia, both private and public sectors are highly dependent on technological solutions (buying more tools and techniques) to protect their information and technological infrastructures. However, since the width and depth of the cyber-attack dimension is growing faster than ever, technology alone can provide some help but will not be a possible solution for the fastest growing cyber-attack scenarios [14,15]. To this end, cybersecurity is well addressed by designing and implementing appropriate sets of governance, management, processes, controls, policies, procedures, and organizational security structures to make sure that security and business objectives are met without having security problems [16,17,18].…”
Section: Introductionmentioning
confidence: 99%