TY - GEN
T1 - Quantifying security threats and their impact
AU - Aissa, Anis Ben
AU - Abercrombie, Robert K.
AU - Sheldon, Frederick T.
AU - Mili, Ali
PY - 2009
Y1 - 2009
N2 - In earlier works, we present a computational infrastructure that allows an analyst to estimate the security of a system in terms of the loss that each stakeholder stands to sustain as a result of security breakdowns. In this paper, we illustrate this infrastructure by means of an e-commerce application.
AB - In earlier works, we present a computational infrastructure that allows an analyst to estimate the security of a system in terms of the loss that each stakeholder stands to sustain as a result of security breakdowns. In this paper, we illustrate this infrastructure by means of an e-commerce application.
KW - Cyber security metrics
KW - Information security
KW - Risk management
UR - http://www.scopus.com/inward/record.url?scp=70350683573&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=70350683573&partnerID=8YFLogxK
U2 - 10.1145/1558607.1558637
DO - 10.1145/1558607.1558637
M3 - Conference contribution
AN - SCOPUS:70350683573
SN - 9781605585185
T3 - ACM International Conference Proceeding Series
BT - CSIIRW09
T2 - CSIIRW 2009: 5th Annual Cyber Security and Information Intelligence Research Workshop: Cyber Security and Information Intelligence Challenges and Strategies
Y2 - 13 April 2009 through 15 April 2009
ER -