Managing complex IT security processes with value based measures

Robert K. Abercrombie, Frederick T. Sheldon, Ali Mili

Research output: Chapter in Book/Report/Conference proceedingConference contribution

16 Scopus citations

Abstract

Current trends indicate that IT security measures will need to greatly expand to counter the ever increasingly sophisticated, well-funded and/or economically motivated threat space. Traditional risk management approaches provide an effective method for guiding courses of action for assessment, and mitigation investments. However, such approaches no matter how popular demand very detailed knowledge about the IT security domain and the enterprise/cyber architectural context. Typically, the critical nature and/or high stakes require careful consideration and adaptation of a balanced approach that provides reliable and consistent methods for rating vulnerabilities. As reported in earlier works, the Cyberspace Security Econometrics System provides a comprehensive measure of reliability, security and safety of a system that accounts for the criticality of each requirement as a function of one or more stakeholders' interests in that requirement. This paper advocates a dependability measure that acknowledges the aggregate structure of complex system specifications, and accounts for variations by stakeholder, by specification components, and by verification and validation impact.

Original languageEnglish (US)
Title of host publication2009 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009 - Proceedings
DOIs
StatePublished - Jul 20 2009
Event2009 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009 - Nashville, TN, United States
Duration: Mar 30 2009Apr 2 2009

Publication series

Name2009 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009 - Proceedings

Other

Other2009 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009
CountryUnited States
CityNashville, TN
Period3/30/094/2/09

All Science Journal Classification (ASJC) codes

  • Artificial Intelligence
  • Computational Theory and Mathematics
  • Information Systems
  • Software

Fingerprint Dive into the research topics of 'Managing complex IT security processes with value based measures'. Together they form a unique fingerprint.

Cite this