2016
DOI: 10.1109/msp.2016.47
|View full text |Cite
|
Sign up to set email alerts
|

The Navigation Metaphor in Security Economics

Abstract: Security models and security economics have been separate developments for a long time. Models represent the organisation under scrutiny with possible attack paths, and security economics covers the effect and cost of attacks and counter-measures. This inhibits progress in decision support for security investment. The navigation metaphor merges these two concepts: navigation on security models can identify optimal attacker and defender decisions for multistep attacks, based on "maps" of the system being studie… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2016
2016
2018
2018

Publication Types

Select...
3
1

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 12 publications
0
3
0
Order By: Relevance
“…In the TRE S PASS project [7], visualisations such as our approach contribute to the attack navigator [16,17]. Beyond this, the techniques presented here are widely applicable.…”
Section: Resultsmentioning
confidence: 99%
“…In the TRE S PASS project [7], visualisations such as our approach contribute to the attack navigator [16,17]. Beyond this, the techniques presented here are widely applicable.…”
Section: Resultsmentioning
confidence: 99%
“…We have published key innovations in for example the attack navigation metaphor [14], making attacker profiles explicit [28], attack generation [20,21], quantitative analysis [29,30], and visualisation of maps and paths [31,32]. Our practical and theoretical developments open up for many new and interesting research questions in the area of attack navigation and graphical models for security, for example:…”
Section: Discussionmentioning
confidence: 99%
“…The attacker profiles also imply a link between attack navigators and security economics [14]. Both attackers and defenders have costs for their actions, and utility functions associated with the possible outcomes, but only a limited budget.…”
Section: The Attack Navigatormentioning
confidence: 99%