Deriving an information security assurance indicator at the organizational level
Author:
Pathari Vinod,M. Sonar Rajendra
Abstract
Purpose
– Measurement of information security assurance (ISA) is an important but difficult task. This paper aims to propose a framework, which helps in refining information security requirements into controls whose effectiveness can be measured. This work also provides aggregation techniques to combine these measurements so as to obtain an indicator for ISA at the organizational level.
Design/methodology/approach
– A top-down approach of refining security objectives to measurable independent tasks is carried out using assign graph as the model. This captures the various objectives and their interrelationships whose initial values and relative impacts are obtained from experts. Using fuzzy cognitive model (FCM), these initial values are combined together to obtain an indicator for ISA at the firm's level.
Findings
– The two applications of the framework revealed that interrelationships do exist between the different controls employed in actual security implementations and that these dependencies are seldom accounted for. When those few controls that are to be measured are clearly identified, the security experts can focus their attention on them and ensure their correct implementation and appropriate measurement. The extent of impact of a single control on the overall security picture of the firm can also be found using this approach.
Research limitations/implications
– While the framework is generic, the assurance values obtained are context-sensitive. This is primarily because of the subjectivity involved in assigning impact measures and initial values.
Practical implications
– This work helps in answering two difficult questions in information security management: “what to measure?” and “how to quantify the overall security assurance of the organization?” This assists the information security team in identifying and refining those controls that needs to be appropriately emphasized. The proposed framework helps the top management in doing “what-if” analysis, thereby aiding their decision-making for information security investments.
Originality/value
– The novel framework proposes a top-down approach for security control refinement and a bottom-up approach for combining the confidence values to obtain an indicator for ISA. This work identifies and accommodates the possibilities of having interdependencies between security controls. The proposed aggregation method using FCM is being applied for the first time in information security context and provides convergence even in the presence of cyclic dependencies amongst the controls.
Subject
Library and Information Sciences,Management Science and Operations Research,Business and International Management,Management Information Systems
Reference32 articles.
1. Anderson, R.
(2001), “Why information security is hard-an economic perspective”, Proceedings 17th Annual Computer Security Applications Conference, ACSAC 2001, pp. 358-365. 2. Atzeni, A.
and
Lioy, A.
(2006), “Why to adopt a security metric? A brief survey”, Quality of Protection, Advances in Information Security, Vol. 23, pp. 1-12. 3. Bartol, N.
,
Bates, B.
,
Goertzel, K.M.
and
Winograd, T.
(2009), Measuring Cyber Security and Information Assurance (State-of-the-Art Report (SOAR)), Information Assurance Technology Analysis Center (IATAC), Herndon, VA. 4. Bashir, M.
and
Christin, N.
(2008), “Three case studies in quantitative information risk analysis”, Proceedings of the CERT/SEI Making the Business Case for Software Assurance Workshop, Pittsburgh, PA, pp. 77-86. 5. Basile, C.
,
Lioy, A.
,
Perez, G.M.
,
Clemente, F.J.
and
Skarmeta, A.F.
(2007), “POSITIF: a policy-based security management system”, Eighth IEEE International Workshop on Policies for Distributed Systems and Networks, POLICY '07, p. -.
|
|