2018
DOI: 10.1016/j.dss.2018.10.001
|View full text |Cite
|
Sign up to set email alerts
|

Decision support for the optimal allocation of security controls

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
4
0
1

Year Published

2019
2019
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 14 publications
0
4
0
1
Order By: Relevance
“…We were inspired by these works in the creation of our own mission decomposition model presented in our earlier paper 4 . The model used in our work uses the AND/OR notation and is based on the constraint satisfaction problem 17,20,24,25 . The difference between our approach and the related work is that we do not consider mission capacity; functional requirements, that is, constraints, are a binary matter.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…We were inspired by these works in the creation of our own mission decomposition model presented in our earlier paper 4 . The model used in our work uses the AND/OR notation and is based on the constraint satisfaction problem 17,20,24,25 . The difference between our approach and the related work is that we do not consider mission capacity; functional requirements, that is, constraints, are a binary matter.…”
Section: Related Workmentioning
confidence: 99%
“…4 The model used in our work uses the AND/OR notation and is based on the constraint satisfaction problem. 17,20,24,25 The difference between our approach and the related work is that we do not consider mission capacity; functional requirements, that is, constraints, are a binary matter. The logic of the model used in our work allows selecting the most resilient configuration among all feasible ones, that is, to derive a Bayesian network of associated privileges including both critical targets and likely attacker positions and to calculate the resilience of the configuration.…”
Section: Mission-centric Cybersecuritymentioning
confidence: 99%
See 1 more Smart Citation
“…Besides investing in cyber controls, parts of the literature have looked into the effect of uncertainties during the risk assessment phases and how these affect the investment decisions [ 58 , 59 ]. The same works compute optimal strategies given these uncertainties offering cybersecurity investment models that are robust to these uncertainties meaning that they optimise return on security investment despite not having the accurate values about the probabilities of different cyber attacks being materialised.…”
Section: Related Workmentioning
confidence: 99%
“…De los 35 artículos seleccionados, cinco se refieren a investigaciones que incluyen modelos de optimización cuantitativos para la selección de ISC (Almeida & Respício, 2018;Kawasaki & Hiromatsu, 2014;Sawik, 2013;Yevseyeva, Basto-Fernandes, Emmerich, & van Moorsel, 2015;Zhang, Chari, & Agrawal, 2018). Estos enfoques proponen un modelo de selección de controles mediante la aplicación de un modelo de optimización de multi-objetivos, en el que relacionan los controles con sus riesgos asociados y su distribución de costos, para obtener una solución óptima.…”
Section: Gestión De Los Controles De Seguridad De La Informaciónunclassified