The Security-specific Eight Stage Risk Assessment Methodology

نویسندگان

  • David L. Drake
  • Katherine L. Morse
چکیده

Existing security risk assessment methodologies have three major flaws: they rely on the assessor to formulate the chain of events that describe each of its threat scenarios, their models cause a combinatorial explosion of calculations due to analysis of the effectiveness of each countermeasure against each threat/vulnerability pair, and they do not spotlight the specific area of improvement needed when threat scenarios are deemed too high risk. This paper presents an eight stage model that is specifically for security threat scenarios, which will directly address these three flaws. The eight stage model is designed to be incorporated into existing risk assessment methodologies at the point where the assessor is to identify threats and analyze the effectiveness of existing countermeasures. By making a distinction between the time a threat occurs, the time a security breach occurs, and the time the harm of that breach occurs, it becomes clear where the countermeasures are in place to break this chain of events. By providing this generic chain of events, the assessor can reduce the number of scenarios analyzed down to one per threat/asset pair, and at the same time identify the specific type of countermeasures that are lacking.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A risk model for cloud processes

Traditionally, risk assessment consists of evaluating the probability of "feared events", corresponding to known threats and attacks, as well as these events' severity, corresponding to their impact on one or more stakeholders. Assessing risks of cloud-based processes is particularly difficult due to lack of historical data on attacks, which has prevented frequency-based identification...

متن کامل

Determining Optimal Risk Assessment Model in Construction Projects (Case study: steel plant construction project)

Introduction: Identifying occupational hazards and managing occupational safety and health risks is the most important mission and responsibility of the health and safety management system in organizations and adopting coded plans to achieve this is the key to continuously improving this system and promoting it. Method: This descriptive-analytic research has been written to determine the optim...

متن کامل

Estimating Security Risk for Web Applications using Security Vectors

Risk assessment has been getting increased attention as the new vulnerabilities and threats are emerging on daily basis. The popularity and complexity of web application present challenges to the security implementation for web engineering. It is well known that the earlier to perform risk assessment for software, the less cost needed to mitigate the security risks. However, quantitative estima...

متن کامل

Assessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing

Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...

متن کامل

Effective Methodology for Security Risk Assessment of Computer Systems

Today, computer systems are more and more complex and support growing security risks. The security managers need to find effective security risk assessment methodologies that allow modeling well the increasing complexity of current computer systems but also maintaining low the complexity of the assessment procedure. This paper provides a brief analysis of common security risk assessment methodo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1994