Proceedings of the June 13-16, 1977, National Computer Conference on - AFIPS '77 1977
DOI: 10.1145/1499402.1499425
|View full text |Cite
|
Sign up to set email alerts
|

Problem areas in computer security assessment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

1977
1977
2015
2015

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 6 publications
0
5
0
Order By: Relevance
“…The issues involved in the measurement of cost factors have been studied by the computer risk analysis and security assessment communities. The literature suggests that attempts to fully quantify all factors involved in cost modeling usually generate misleading results because not all factors can be reduced to discrete dollars (or some other common unit of measurement) and probabilities [3,6,9,10,13]. It is recommended that qualitative analysis be used to measure the relative magnitudes of cost factors.…”
Section: Cost Factors and Metricsmentioning
confidence: 99%
“…The issues involved in the measurement of cost factors have been studied by the computer risk analysis and security assessment communities. The literature suggests that attempts to fully quantify all factors involved in cost modeling usually generate misleading results because not all factors can be reduced to discrete dollars (or some other common unit of measurement) and probabilities [3,6,9,10,13]. It is recommended that qualitative analysis be used to measure the relative magnitudes of cost factors.…”
Section: Cost Factors and Metricsmentioning
confidence: 99%
“…50 They concluded, "we prefer to leave it as an open question whether or not a quantitative assessment methodology can ever be developed." 50 Indeed, risk assessors did not even agree on terminology. At the 1978 workshop, a session on managerial and organizational vulnerabilities and controls noted, Efforts of this group were hampered in the identification of vulnerabilities and controls by a lack of adequate definition of critical terminology such as threats, vulnerabilities, risk, risk analysis, and risk assessment.…”
Section: Inadequate Modelsmentioning
confidence: 99%
“…50 Such models were useless because they "assume that we are able to supply values for the parameters of the model which, in fact, we are not able to supply." 50 By contrast, Courtney, who spoke immediately prior to the RAND researchers at the 1977 National Computer Security Conference, acknowledged that precise data was not available but insisted that order of magnitude estimates were usually sufficient. 46 Some researchers sought to make uncertainties more explicit in computer security risk assessment.…”
Section: Inadequate Modelsmentioning
confidence: 99%
“…The issues involved in the measurement of cost factors have been studied by the computer risk analysis and security assessment communities. The literature suggests that attempts to fully quantify all factors involved in cost modeling usually generate misleading results because not all factors can be reduced to discrete dollars (or some other common unit of measurement) and probabilities [18,19,20,21,22]. It is recommended that qualitative analysis be used to measure the relative magnitudes of cost factors.…”
Section: Cost Factors and Metricsmentioning
confidence: 99%