2016
DOI: 10.1007/s40070-016-0055-7
|View full text |Cite
|
Sign up to set email alerts
|

Selecting security control portfolios: a multi-objective simulation-optimization approach

Abstract: Organizations' information infrastructures are exposed to a large variety of threats. The most complex of these threats unfold in stages, as actors exploit multiple attack vectors in a sequence of calculated steps. Deciding how to respond to such serious threats poses a challenge that is of substantial practical relevance to IT security managers. These critical decisions require an understanding of the threat actors -including their various motivations, resources, capabilities, and points of access -as well as… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2018
2018
2025
2025

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 42 publications
(40 reference statements)
0
7
0
Order By: Relevance
“… Business impact/disruption, anticipated loss, profit reduction, fines, reputation, decline in stock price, damage [17]- [23]  Risk tolerance [12], [19], [24]; Budget [19]  Legal and regulatory [22]  Self-imposed constraints [22] Asset  Importance/value [13], [24]- [27]  Assessed risk [12], [24]  Probability of breach, event, or successful attack [13], [24], [26], [28], [29] Threat  Anticipated [25], [27], [30], [31]  Most significant [25]  Residual risk [23], [32]; Incident data [17] Control  Cost, general [12], [13], [30], [32], [18], [20]- [23], [26]- [28]  Purchase/setup [17], [24], [25], [33]- [35]  Number of controls as a proxy for cost [36]  Difficulty of implementation [25]  Operation, training, and maintenance cost [17], [24], [25],…”
Section: Organizationalmentioning
confidence: 99%
See 1 more Smart Citation
“… Business impact/disruption, anticipated loss, profit reduction, fines, reputation, decline in stock price, damage [17]- [23]  Risk tolerance [12], [19], [24]; Budget [19]  Legal and regulatory [22]  Self-imposed constraints [22] Asset  Importance/value [13], [24]- [27]  Assessed risk [12], [24]  Probability of breach, event, or successful attack [13], [24], [26], [28], [29] Threat  Anticipated [25], [27], [30], [31]  Most significant [25]  Residual risk [23], [32]; Incident data [17] Control  Cost, general [12], [13], [30], [32], [18], [20]- [23], [26]- [28]  Purchase/setup [17], [24], [25], [33]- [35]  Number of controls as a proxy for cost [36]  Difficulty of implementation [25]  Operation, training, and maintenance cost [17], [24], [25],…”
Section: Organizationalmentioning
confidence: 99%
“…These decisions are complex, inexact, and involve multiple stakeholders with diverse interests. Moreover, there is no "one size fits all" approach because, for example, information environments, business dependence on those environments, relevant cyber threats, risk tolerance levels, and security budgets vary from one organization to the next [13].…”
Section: Introductionmentioning
confidence: 99%
“…According to the article (Kiesling et al, 2016), organizations and their infrastructures are exposed to constant threats, and deciding the better way to respond to them is a difficult task for IT security managers. For that very reason, the work aims to combine the concept of security with a simulation of an infrastructure capable of fighting attacks and providing decision support components.…”
Section: Security Controls Selectionmentioning
confidence: 99%
“…In order to create a model capable of dealing with attacks, it is necessary to have knowledge beyond technology, because psychological, sociological or economic parameters should not be forgotten. To conclude, Kiesling et al (2016) argue that in the future a method must be integrated that simulates the impact of attacks on an organization's business process.…”
Section: Security Controls Selectionmentioning
confidence: 99%
“…Huang (2007) treats the project parameters as uncertain and combines a genetic algorithm with random fuzzy simulation in order to account for this. An interesting application combining discrete-event simulation with a genetic algorithm to select security control portfolios is discussed in Kiesling et al (2016). In the context of an IT infrastructure subject to a number of threats, the authors focus on selecting the best policy from efficient combinations of security controls.…”
Section: Introductionmentioning
confidence: 99%