Methodology for evaluating security controls based on key performance indicators and stakeholder mission

Frederick T. Sheldon, Robert K. Abercrombie, Ali Mili

Research output: Chapter in Book/Report/Conference proceedingConference contribution

27 Scopus citations

Abstract

Information security continues to evolve in response to disruptive changes with a persistent focus on information-centric controls and a healthy debate about balancing endpoint and network protection, with a goal of improved enterprise/business risk management. Economic uncertainty, intensively collaborative styles of work, virtualization, increased outsourcing and ongoing compliance pressures require careful consideration and adaptation. This paper proposes a Cyberspace Security Econometrics System (CSES) that provides a measure (i.e., a quantitative indication) of reliability, performance and/or safety of a system that accounts for the criticality of each requirement as a function of one or more stakeholders' interests in that requirement. For a given stakeholder, CSES accounts for the variance that may exist among the stakes one attaches to meeting each requirement. This paper introduces the basis, objectives and capabilities for the CSES including inputs/outputs as well as the structural and mathematical underpinnings.

Original languageEnglish (US)
Title of host publicationProceedings of the 42nd Annual Hawaii International Conference on System Sciences, HICSS
DOIs
StatePublished - 2009
Event42nd Annual Hawaii International Conference on System Sciences, HICSS - Waikoloa, HI, United States
Duration: Jan 5 2009Jan 9 2009

Publication series

NameProceedings of the 42nd Annual Hawaii International Conference on System Sciences, HICSS

Other

Other42nd Annual Hawaii International Conference on System Sciences, HICSS
Country/TerritoryUnited States
CityWaikoloa, HI
Period1/5/091/9/09

All Science Journal Classification (ASJC) codes

  • Computer Science Applications
  • Information Systems

Fingerprint

Dive into the research topics of 'Methodology for evaluating security controls based on key performance indicators and stakeholder mission'. Together they form a unique fingerprint.

Cite this