2015
DOI: 10.1109/mahc.2015.30
|View full text |Cite
|
Sign up to set email alerts
|

Measuring Risk: Computer Security Metrics, Automation, and Learning

Abstract: Risk management is widely seen as the basis for cybersecurity in contemporary organizations. Risk management aims to minimize the combined cost of security breaches and measures to prevent breaches. This article analyzes debate over computer security risk assessment in the 1970s and 1980s, arguing that the most valuable part of risk management-learning-is also one of its most neglected aspects.The Cybersecurity Framework shall provide a prioritized, flexible, repeatable, performancebased, and cost-effective ap… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 31 publications
(6 citation statements)
references
References 23 publications
0
6
0
Order By: Relevance
“…Others feel it is challenging, yet feasible (Pfleeger and Cunningham, 2010). Yet others conjecture that security risk analysis does not provide value through the measurement itself, but through the knowledge analysts gain by thinking about security (Slayton, 2015). Nevertheless, the overwhelming consensus is that cybersecurity assessment is necessary (Jaquith, 2007).…”
Section: Case Study 1: Cybersecurity Metric Researchmentioning
confidence: 99%
“…Others feel it is challenging, yet feasible (Pfleeger and Cunningham, 2010). Yet others conjecture that security risk analysis does not provide value through the measurement itself, but through the knowledge analysts gain by thinking about security (Slayton, 2015). Nevertheless, the overwhelming consensus is that cybersecurity assessment is necessary (Jaquith, 2007).…”
Section: Case Study 1: Cybersecurity Metric Researchmentioning
confidence: 99%
“…But rapid technological change and complexity both created uncertainties about potential failure scenarios, and made the construction of actuarial tables impractical if not impossible. Thus, federal agencies remained skeptical of risk management, arguing that it was complicated, expensive, and of questionable value (Slayton 2015).…”
Section: Creating a Regime Of Insecuritymentioning
confidence: 99%
“…One answer is that information systems proliferate unknown risks that elude the monitoring depicted in Figure 2. The "arbitrary complexity" of information systems, combined with a tendency toward constant change, both proliferates and obscures unknown risks (Slayton 2013(Slayton , 2015. Unpredictability stems not only from the complexity of modern information systems-including complex software that can run in an effectively infinite number of ways, myriad hardware devices, and communications links-but from the fact that each of these components is linked to human and social organizations that defy deterministic behavior-software manufacturers and maintainers, Internet service providers, web platform companies such as Google and Facebook, and more.…”
Section: Conceptualizing Information Security Governancementioning
confidence: 99%
“…Two recent special issues of the IEEE Annals of the History of Computing provided a range of new histories (Yost, 2015(Yost, , 2016, from the early US government policy in computer security (Lipner, 2015;Warner, 2015), to security discourse at government contractors (Misa, 2016), to the late twentieth century efforts to deploy public key infrastructure in South Korea (Park, 2015). Other works in these special issues included histories of computer security metrics (Slayton, 2015), as well as what DeNardis (2015) calls the "design tension between surveillance and security". In this works, DeNardis (2015, p. 74) argued that security was a concern by 1986, pointing to interest in access control and authentication.…”
Section: Histories Of Network Cybersecurity and Internet Governancementioning
confidence: 99%