Proceedings of the 2012 New Security Paradigms Workshop 2012
DOI: 10.1145/2413296.2413298
|View full text |Cite
|
Sign up to set email alerts
|

A move in the security measurement stalemate

Abstract: One of the big problems of risk assessment in information security is the quantification of risk-related properties, such as vulnerability. Vulnerability expresses the likelihood that a threat agent acting against an asset will cause impact, for example, the likelihood that an attacker will be able to crack a password or break into a system. This likelihood depends on the capabilities of the threat agent and the strength of the controls in place. In this paper, we provide a framework for estimating these three… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
2
2
1
1

Relationship

2
4

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 28 publications
0
7
0
Order By: Relevance
“…Factor Analysis of Information Risk (FAIR). To define our concepts (the same as in [13,14]), we use the risk definitions provided by The Open Group [16]. In this taxonomy, risk-related variables are defined starting from the notions of assets and threat agents acting against these assets, potentially causing damage.…”
Section: Preliminariesmentioning
confidence: 99%
See 3 more Smart Citations
“…Factor Analysis of Information Risk (FAIR). To define our concepts (the same as in [13,14]), we use the risk definitions provided by The Open Group [16]. In this taxonomy, risk-related variables are defined starting from the notions of assets and threat agents acting against these assets, potentially causing damage.…”
Section: Preliminariesmentioning
confidence: 99%
“…In this definition, TC denotes some ability measure of the threat agent, and CS a resistance (or difficulty of passing) estimate of the control. We have discussed this relation in detail in [14]. Note that the term vulnerability is used as probability of success here, not as a software bug causing a security weakness.…”
Section: Preliminariesmentioning
confidence: 99%
See 2 more Smart Citations
“…The basic Elo rating system is used in several types of contests beyond chess, for example, football [21]; however, different applications have been extensively reported elsewhere. It has been used for eliciting user preferences in community-based sites [22], assessing security and vulnerability risks [23], ranking posts in web-based forums [24], rating patterns in videogames [25], detecting fabric defects in the textile industry [26], providing students with individualized learning materials in educational settings [20], studying traffic congestion in urban transportation [27], studying dominance hierarchies in behavioral and evolutionary animal ecology [28], forecasting sales and optimizing prices of new product releases [29], allocating resources for criminal justice to support supervision officers [30], and identifying people using facial comparative descriptions [31].…”
Section: Introductionmentioning
confidence: 99%