2016
DOI: 10.1016/j.cose.2016.03.009
|View full text |Cite
|
Sign up to set email alerts
|

Information assurance techniques: Perceived cost effectiveness

Abstract: The assurance technique is a fundamental component of the assurance ecosystem; it is the mechanism by which we assess security to derive a measure of assurance. Despite this importance, the characteristics of these assurance techniques have not been comprehensively explored within academic research from the perspective of industry stakeholders. Here, a framework of 20 "assurance techniques" is defined along with their interdependencies. A survey was conducted which received 153 responses from industry stakehol… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
22
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
6
1

Relationship

3
4

Authors

Journals

citations
Cited by 32 publications
(22 citation statements)
references
References 18 publications
0
22
0
Order By: Relevance
“…To conduct the vulnerability assessment and assess the effectiveness of the 5 cyber essentials security controls, and due to the nature of SMEs that do not have the resources to separate testing from operational systems, we sought to avoid "active" security testing techniques like penetration testing, which may have an operational impact on this already resource-constrained type of businesses. Instead, we used a less aggressive approach, particularly using: architectural reviews, configuration reviews, and interviews, which are, however, known to be some of the most costeffective security testing techniques in practice [19]. As part of the assessment, we firstly mapped between the selected SME's characteristics (see below) and network features on the one hand and the 200 randomly selected vulnerabilities on the other hand.…”
Section: Cyber Essentialsmentioning
confidence: 99%
“…To conduct the vulnerability assessment and assess the effectiveness of the 5 cyber essentials security controls, and due to the nature of SMEs that do not have the resources to separate testing from operational systems, we sought to avoid "active" security testing techniques like penetration testing, which may have an operational impact on this already resource-constrained type of businesses. Instead, we used a less aggressive approach, particularly using: architectural reviews, configuration reviews, and interviews, which are, however, known to be some of the most costeffective security testing techniques in practice [19]. As part of the assessment, we firstly mapped between the selected SME's characteristics (see below) and network features on the one hand and the 200 randomly selected vulnerabilities on the other hand.…”
Section: Cyber Essentialsmentioning
confidence: 99%
“…The coding process generated a set of intervention techniques, as shown in Table 1. The majority of these are already well known and documented; for these we have used the terminology defined by Such et al [4]. However, three of the practices-On-the-job Training, Incentivization Session, and Product Negotiation-are new in the context of security assurance techniques.…”
Section: Intervention Practicesmentioning
confidence: 99%
“…Existing research has identified a range of well-understood assurance techniques [4] used by security professionals to help improve the security of a system. Yet if we are to improve software security in a wide range of teams, we need approaches that work where resources may be limited and security expertise unavailable.…”
Section: Introductionmentioning
confidence: 99%
“…Existing research has identified a range of well‐understood assurance techniques used by security professionals to help improve the security of a system. However, if we are to improve software security in a wide range of teams, we need approaches that work where resources may be limited and security expertise unavailable.…”
Section: Introductionmentioning
confidence: 99%
“…Taking a different approach, Such et al investigated the economics of software security, surveying 150 security specialists to analyze the economics of different assurance techniques . The survey generated a taxonomy of twenty assurance techniques and found wide variations in the perceived cost effectiveness of each.…”
Section: Introductionmentioning
confidence: 99%