Skip to main content
Erschienen in: Wireless Personal Communications 3/2016

01.08.2016

Information Security Evaluation Using Multi-Attribute Threat Index

verfasst von: Young-Man Je, Yen-Yoo You, Kwan-Sik Na

Erschienen in: Wireless Personal Communications | Ausgabe 3/2016

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Threat to security has been increasing along with proliferation of service through the Web. Multi-attribute risk assessment serves as a useful tool to assess risk quantitatively by prioritizing sets of threats and security requirements. The case study presents decision-making methods as to the selection of information security technology and solution through the process of identifying risk and quantifying threat index. Since the intrusion types and analysis data was analyzed based on the statistics of multiple enterprises, it is advisable to classify the types into more detailed types suitable to the target company, and to reasonably reflect the characteristics of the organization through accumulation and utilization of the company’s own data.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Ojanperä, T., & Mononen, R. (2002). Security and authentication in the mobile world. Wireless Personal Communications, 22(2), 229–235.CrossRef Ojanperä, T., & Mononen, R. (2002). Security and authentication in the mobile world. Wireless Personal Communications, 22(2), 229–235.CrossRef
2.
Zurück zum Zitat Saravanan, K., & Senthilkumar, A. (2015). Security enhancement in distributed networks using link-based mapping scheme for network intrusion detection with enhanced bloom filter. Wireless Personal Communications, 64(2), 821–839.CrossRef Saravanan, K., & Senthilkumar, A. (2015). Security enhancement in distributed networks using link-based mapping scheme for network intrusion detection with enhanced bloom filter. Wireless Personal Communications, 64(2), 821–839.CrossRef
3.
Zurück zum Zitat Prasad, A., & Kempf, J. (2003). Wireless personal communications special issue on security for next generation communications. Wireless Personal Communications, 26(2–3), 283–284.CrossRef Prasad, A., & Kempf, J. (2003). Wireless personal communications special issue on security for next generation communications. Wireless Personal Communications, 26(2–3), 283–284.CrossRef
4.
Zurück zum Zitat Feledi, D., Fenz, S., & Lechner, L. (2013). Toward web-based information security knowledge sharing. Information Security Technical Report, 17, 199–209.CrossRef Feledi, D., Fenz, S., & Lechner, L. (2013). Toward web-based information security knowledge sharing. Information Security Technical Report, 17, 199–209.CrossRef
5.
Zurück zum Zitat Kumar, R., & Singh, H. (2012). Analysis of information systems security issues and security techniques. International Journal of Advanced Computer Research, 2(6), 65–68. Kumar, R., & Singh, H. (2012). Analysis of information systems security issues and security techniques. International Journal of Advanced Computer Research, 2(6), 65–68.
6.
Zurück zum Zitat Prasad, A. R., & Kempf, J. (2004). Security for next generation communications. Wireless Personal Communications, 29(3–4), 157–208.CrossRef Prasad, A. R., & Kempf, J. (2004). Security for next generation communications. Wireless Personal Communications, 29(3–4), 157–208.CrossRef
7.
Zurück zum Zitat Feng, N., Wang, H., & Li, M. (2013). A security risk analysis model for information systems: Causal relationships of risk factors and vulnerability propagation analysis. Information Sciences, 256, 57–73.CrossRef Feng, N., Wang, H., & Li, M. (2013). A security risk analysis model for information systems: Causal relationships of risk factors and vulnerability propagation analysis. Information Sciences, 256, 57–73.CrossRef
8.
Zurück zum Zitat Bang, Y., Lee, D., Bae, Y., & Ahn, J. (2012). Improving information security management: An analysis of ID–password usage and a new login vulnerability measure. International Journal of Information Management, 32(5), 409–418.CrossRef Bang, Y., Lee, D., Bae, Y., & Ahn, J. (2012). Improving information security management: An analysis of ID–password usage and a new login vulnerability measure. International Journal of Information Management, 32(5), 409–418.CrossRef
9.
Zurück zum Zitat Von Solms, R., & Van Niekerk, J. (2013). From information security to cyber security. Computers & Security, 38, 196–207. Von Solms, R., & Van Niekerk, J. (2013). From information security to cyber security. Computers & Security, 38, 196–207.
10.
Zurück zum Zitat Veiga, A., & Eloff, J. (2010). A framework and assessment instrument for information security culture. Computers & Security, 29, 196–207.CrossRef Veiga, A., & Eloff, J. (2010). A framework and assessment instrument for information security culture. Computers & Security, 29, 196–207.CrossRef
11.
Zurück zum Zitat Kim, K., & Na, K. (2004). Threat index evaluation of information system using multi-attribute risk assessment method. Journal of Korea Risk Management Society, 15(2), 103–126. Kim, K., & Na, K. (2004). Threat index evaluation of information system using multi-attribute risk assessment method. Journal of Korea Risk Management Society, 15(2), 103–126.
12.
Zurück zum Zitat Lee, K., Kim, K., & Na, K. (2008). Multi-attribute threat index for information security. Journal of Korea Society of IT Services, 7(1), 118–122. Lee, K., Kim, K., & Na, K. (2008). Multi-attribute threat index for information security. Journal of Korea Society of IT Services, 7(1), 118–122.
13.
Zurück zum Zitat Butler, S. (2000). Security attribute evaluation method: A cost benefit approach. In 24th International conference on software engineering proceedings (pp. 22–240). Butler, S. (2000). Security attribute evaluation method: A cost benefit approach. In 24th International conference on software engineering proceedings (pp. 22–240).
14.
Zurück zum Zitat Butler, S., & Fischbeck, P. (2001). Multi-attribute risk assessment, Technical Report CMU-CS-01-169. Butler, S., & Fischbeck, P. (2001). Multi-attribute risk assessment, Technical Report CMU-CS-01-169.
15.
Zurück zum Zitat Fuchs, L., Pernul, G., & Sandhu, R. (2011). Roles in information security—A survey and classification of the research area. Computers & Security, 30(8), 748–769.CrossRef Fuchs, L., Pernul, G., & Sandhu, R. (2011). Roles in information security—A survey and classification of the research area. Computers & Security, 30(8), 748–769.CrossRef
16.
Zurück zum Zitat Penta Security Systems Inc. (2013). Web application threat report: Trends for the second half of 2012. Penta Security Systems Inc. (2013). Web application threat report: Trends for the second half of 2012.
17.
Zurück zum Zitat Saaty, T. (1980). The analytic hierarchy process. New York: McGraw-Hill.MATH Saaty, T. (1980). The analytic hierarchy process. New York: McGraw-Hill.MATH
18.
Zurück zum Zitat Korea Internet and Security Agency. (2012). Information security survey 2012 (enterprise edition). Korea Internet and Security Agency. (2012). Information security survey 2012 (enterprise edition).
19.
Zurück zum Zitat Saleh, M. (2011). Information security maturity model. International Journal of Computer Science and Security, 5(3), 316–337. Saleh, M. (2011). Information security maturity model. International Journal of Computer Science and Security, 5(3), 316–337.
Metadaten
Titel
Information Security Evaluation Using Multi-Attribute Threat Index
verfasst von
Young-Man Je
Yen-Yoo You
Kwan-Sik Na
Publikationsdatum
01.08.2016
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 3/2016
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-015-3140-5

Weitere Artikel der Ausgabe 3/2016

Wireless Personal Communications 3/2016 Zur Ausgabe

Neuer Inhalt