Deriving an information security assurance indicator at the organizational level

Author:

Pathari Vinod,M. Sonar Rajendra

Abstract

Purpose – Measurement of information security assurance (ISA) is an important but difficult task. This paper aims to propose a framework, which helps in refining information security requirements into controls whose effectiveness can be measured. This work also provides aggregation techniques to combine these measurements so as to obtain an indicator for ISA at the organizational level. Design/methodology/approach – A top-down approach of refining security objectives to measurable independent tasks is carried out using assign graph as the model. This captures the various objectives and their interrelationships whose initial values and relative impacts are obtained from experts. Using fuzzy cognitive model (FCM), these initial values are combined together to obtain an indicator for ISA at the firm's level. Findings – The two applications of the framework revealed that interrelationships do exist between the different controls employed in actual security implementations and that these dependencies are seldom accounted for. When those few controls that are to be measured are clearly identified, the security experts can focus their attention on them and ensure their correct implementation and appropriate measurement. The extent of impact of a single control on the overall security picture of the firm can also be found using this approach. Research limitations/implications – While the framework is generic, the assurance values obtained are context-sensitive. This is primarily because of the subjectivity involved in assigning impact measures and initial values. Practical implications – This work helps in answering two difficult questions in information security management: “what to measure?” and “how to quantify the overall security assurance of the organization?” This assists the information security team in identifying and refining those controls that needs to be appropriately emphasized. The proposed framework helps the top management in doing “what-if” analysis, thereby aiding their decision-making for information security investments. Originality/value – The novel framework proposes a top-down approach for security control refinement and a bottom-up approach for combining the confidence values to obtain an indicator for ISA. This work identifies and accommodates the possibilities of having interdependencies between security controls. The proposed aggregation method using FCM is being applied for the first time in information security context and provides convergence even in the presence of cyclic dependencies amongst the controls.

Publisher

Emerald

Subject

Library and Information Sciences,Management Science and Operations Research,Business and International Management,Management Information Systems

Reference32 articles.

1. Anderson, R. (2001), “Why information security is hard-an economic perspective”, Proceedings 17th Annual Computer Security Applications Conference, ACSAC 2001, pp. 358-365.

2. Atzeni, A. and Lioy, A. (2006), “Why to adopt a security metric? A brief survey”, Quality of Protection, Advances in Information Security, Vol. 23, pp. 1-12.

3. Bartol, N. , Bates, B. , Goertzel, K.M. and Winograd, T. (2009), Measuring Cyber Security and Information Assurance (State-of-the-Art Report (SOAR)), Information Assurance Technology Analysis Center (IATAC), Herndon, VA.

4. Bashir, M. and Christin, N. (2008), “Three case studies in quantitative information risk analysis”, Proceedings of the CERT/SEI Making the Business Case for Software Assurance Workshop, Pittsburgh, PA, pp. 77-86.

5. Basile, C. , Lioy, A. , Perez, G.M. , Clemente, F.J. and Skarmeta, A.F. (2007), “POSITIF: a policy-based security management system”, Eighth IEEE International Workshop on Policies for Distributed Systems and Networks, POLICY '07, p. -.

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3