An Approach to Select Cost-Effective Risk Countermeasures Exemplified in CORAS

نویسندگان

  • Le Minh Sang Tran
  • Bjørnar Solhaug
  • Ketil Stølen
چکیده

Security risk analysis should be conducted regularly for organizationsto maintain an acceptable level of security. In principle, all risks thatare unacceptable according to the predefined criteria should be mitigated.However, risk mitigation comes at a cost, and only the countermeasuresthat cost-efficiently mitigate risks should be implemented. This reportpresents an approach to integrate the countermeasure cost-benefit assess-ment into the risk analysis, and to provide decision makers with the nec-essary decision support. The approach comes with the necessary model-ing support, a calculus for reasoning about the countermeasure cost andeffect, as well as means for visualization of the results to aid decision mak-ers. The approach is generic in the sense that the modeling and analysistechniques can be instantiated in several established approaches to riskassessment. In this report we demonstrate the instantiation in CORASand exemplify the approach using an eHealth scenario.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Approach to Select Cost-Effective Risk Countermeasures

Security risk analysis should be conducted regularly to maintain an acceptable level of security. In principle, all risks that are unacceptable according to the predefined criteria should be mitigated. However, risk mitigation comes at a cost, and only the countermeasures that cost-efficiently mitigate risks should be implemented. This paper presents an approach to integrate the countermeasure ...

متن کامل

Iterative selection of countermeasures for intelligent threat agents

We describe a model-based approach to select cost effective countermeasures for an information and communication technology infrastructure under attack by intelligent agents. Each agent tries to reach some predefined goals through a sequence of attacks. The proposed approach builds models of the infrastructure and of the agents and then it applies a Monte Carlo method that runs multiple, indepe...

متن کامل

The coras approach for model-based risk management applied to e-commerce domain

The CORAS project develops a practical framework for model-based risk management of security critical systems by exploiting the synthesis of risk analysis methods with semiformal specification methods, supported by an adaptable tool-integration platform. The framework is also accompanied by the CORAS process, which is a systems development process based on the integration of RUP and a standardi...

متن کامل

The Most Cost Effective Gas Cleaning Device in Steel Industry with Industrial Ecology Approach

Industrial growth and environmental damages, as two important indicators in sustainable development are followed by steel industry. This article leads industries to green industry. In this case, energy, material, capital consumption and environmental damages as sustainability patterns of environment have been investigated in three different dust collectors to select the most environmentally sui...

متن کامل

A particle swarm optimization algorithm for minimization analysis of cost-sensitive attack graphs

To prevent an exploit, the security analyst must implement a suitable countermeasure. In this paper, we consider cost-sensitive attack graphs (CAGs) for network vulnerability analysis. In these attack graphs, a weight is assigned to each countermeasure to represent the cost of its implementation. There may be multiple countermeasures with different weights for preventing a single exploit. Also,...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/1302.4689  شماره 

صفحات  -

تاریخ انتشار 2013