Using Contextual Security Policies for Threat Response
نویسندگان
چکیده
With the apparition of accurate security monitoring tools, the gathered alerts are requiring operators to take action to prevent damage from attackers. Intrusion prevention currently provides isolated response mechanisms that may take a local action upon an attack. While this approach has been taken to enhance the security of particular network access control points, it does not constitute a comprehensive approach to threat response. In this paper, we will examine a new mechanism for adapting the security policy of an information system according to the threat it receives, and hence its behaviour and the services it offers. This mechanism takes into account not only threats, but also legal constraints and other objectives of the organization operating this information system, taking into account multiple security objectives and providing several trade-off options between security objectives, performance objectives, and other operational constraints. The proposed mechanism bridges the gap between preventive security technologies and intrusion detection, and builds upon existing technologies to facilitate formalization on one hand, and deployment on the other hand.
منابع مشابه
Which Factors Explain Employees' Adherence to Information Security Policies? An Empirical Study
It is widely agreed that a key threat to information security is caused by careless employees who do not adhere to the information security policies of their organizations. In order to ensure that employees comply with the organization’s information security procedures, a number of information security policy compliance measures have been proposed in the past. Prior research has, however, criti...
متن کاملModelling Context-Aware Security for Electronic Health Records Using Contextual Graphs
The paper presents an approach to modelling security for electronic health records by using Contextual Graphs. Such graphs provide the context in which security policies should be used, i.e. such graphs function as meta-policies. We argue that such an approach has the advantages of modularity and ease of understanding, and supports fine-grained security determined by contexts such as location, ...
متن کاملEmployees' Adherence to Information Security Policies: An Empirical Study
The key threat to information security is constituted by careless employees who do not comply with information security policies. To ensure that employees comply with organizations’ information security procedures, a number of information security policy compliance measures have been proposed in the past. Prior research has criticized these measures as lacking theoretically and empirically grou...
متن کاملMotivating Employees to Comply with Information Security Policies
Employee noncompliance with Information Systems security policies is a serious computer security threat. Employees’ extensive knowledge of information systems, their access credentials, and the trust accorded them by their employers make them a potential threat to computer security. The importance of this phenomenon has led to a number of studies on the “insider threat.” However, research on em...
متن کاملContext-aware Threat Modeling and History Management in Pervasive Environment
Context-awareness is the ability of computing systems to acquire and reason about the situational context and adapt application accordingly. Context-aware system start with gathering of raw, low-level contextual data, interpret the raw contextual data into high-level interpreted context, reason the interpreted context to derive implications and adapt the application behavior on the basis of the...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006