2012
DOI: 10.1016/j.cor.2010.11.013
|View full text |Cite
|
Sign up to set email alerts
|

Quantifying information security risks using expert judgment elicitation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
24
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
5
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 57 publications
(24 citation statements)
references
References 19 publications
0
24
0
Order By: Relevance
“…There are various research efforts on modeling cyber intrusions, for example, to measure the security of a system (or system-of-systems) [5], [6], [7], [8], [9], [10]. These studies make various assumptions to support their claims; a frequent one being that attacks, or intrusions, follow a Poisson process, i.e., that the number of attacks or intrusions is well modeled by a Poisson distribution and that the time between such events is exponentially distributed.…”
Section: Distribution Of Cyber Intrusionsmentioning
confidence: 99%
See 2 more Smart Citations
“…There are various research efforts on modeling cyber intrusions, for example, to measure the security of a system (or system-of-systems) [5], [6], [7], [8], [9], [10]. These studies make various assumptions to support their claims; a frequent one being that attacks, or intrusions, follow a Poisson process, i.e., that the number of attacks or intrusions is well modeled by a Poisson distribution and that the time between such events is exponentially distributed.…”
Section: Distribution Of Cyber Intrusionsmentioning
confidence: 99%
“…In the same fashion as in the area of dependable computing, various research efforts have been made to enable estimating and predicting the security of a system (e.g., [5], [6], [7], [8], [9], [10]). Many such models origin from the domain of dependable computing [4], for example, how many intrusions that occur for a certain system (compared to faults).…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…These analysis make many realistic to support their claims; a frequent one being that attacks, or intrusions, follows a Poisson process that the number of attacks or intrusions is well modeled by a Poisson distribution and that the time taken between such events is ideally distributed. In the paper [7,8,9] at the best of the author's knowledge, there is only one publication that an idea of the distribution of TTC using empirical information in data. The authors have observed that a total of 59 breaches, each of which them were categorized into one of six classes depending on the amount of hours taken to perform it [6].…”
Section: IImentioning
confidence: 99%
“…They provide a comprehensive survey of research and show that there is not sufficient empirical evidence to corroborate the hypothesis that computer and information "security can cor-rectly be represented with quantitative information" (Verendel, 2009, p. 37). In our paper, we do follow the numerous researchers attempting to quantify IT security risks (e.g., Feng & Li, 2011;Ryan et al, 2012;Rebollo, et al, 2015). This quantification may be used to construct a relationship between improvement and investment and allow gradual, optimal investment as in Giat (2013).…”
Section: It Risk Managementmentioning
confidence: 99%