2019
DOI: 10.48550/arxiv.1904.11052
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Risky Business: Assessing Security with External Measurements

Benjamin Edwards,
Jay Jacobs,
Stephanie Forrest

Abstract: Security practices in large organizations are notoriously difficult to assess. The challenge only increases when organizations turn to third parties to provide technology and business services, which typically require tight network integration and sharing of confidential data, potentially increasing the organization's attack surface. The security maturity of an organization describes how well it mitigates known risks and responds to new threats. Today, maturity is typically assessed with audits and questionnai… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 24 publications
0
2
0
Order By: Relevance
“…Edwards et al [29] provide an illustrative exception in their study. They find that organisations who do not block peer-to-peer file sharing have "318 times higher" rates of botnet compromise, and also find TLS configuration errors are statistically significant correlates of compromise.…”
Section: Descriptivementioning
confidence: 87%
“…Edwards et al [29] provide an illustrative exception in their study. They find that organisations who do not block peer-to-peer file sharing have "318 times higher" rates of botnet compromise, and also find TLS configuration errors are statistically significant correlates of compromise.…”
Section: Descriptivementioning
confidence: 87%
“…In addressing the challenge of assessing security practices in large organisations, particularly when integrating third-party services, Edwards et al [40] highlighted the limitations of traditional risk assessment methods like audits and questionnaires. These conventional approaches often fail to capture the dynamic nature of third-party security risks, which are exacerbated by the integration of external services involving the sharing of sensitive data and extensive network integration.…”
Section: Third-party and Supply Chain Cybersecuritymentioning
confidence: 99%