A Model to Measure Effectiveness in Cyber Security Situational Awareness

Publish Year: 1403
نوع سند: مقاله ژورنالی
زبان: English
View: 47

This Paper With 10 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

JR_CKE-7-1_003

تاریخ نمایه سازی: 26 خرداد 1403

Abstract:

Nowadays, the number of cyberattacks and, consequently, the risk of them is increasing significantly. So, it is vital to be aware of the cybersecurity situation. This paper provides a model to measure the success or effectiveness of the organization's security missions, that is, to determine whether security events such as the occurrence of an attack or the selection of countermeasures have been effective on the success of organizational missions. Two components are considered as inputs for this purpose. The first one is the network dependency graph which demonstrates how different assets in the network are dependent on each other and with what intensity or weight they affect each other. Another component is the mission dependency graph which specifies the relation between organizational assets, tasks, functions, and mission objectives. It also specifies the impact of the assets on the organizational tasks, functions, and mission objectives. Previous researches focused more on determining the impact of attacks on different assets. However, this paper aims to assess this impact by considering the organizational mission. This model is proposed in such a way that its components are separable. It helps different organizations with specific goals and different requirements to use this model so that they can personalize and customize its different components. This model can be employed for critical asset recognition. Moreover, it enables us to know which countermeasures are more effective in terms of the organizational mission.

Authors

Motahareh Dehghan

Department of Industrial and Systems Engineering, Tarbiat Modares University.

AmirAbbas Mahdi Zadeh

Department of Computer Engineering, Amirkabir University of Technology.

Babak Sadeghian

Department of Computer Engineering, Amirkabir University of Technology.

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • Endsley, M. R. (۱۹۹۵). Toward a theory of situation awareness ...
  • Malowidzki, M., Hermanowski, D., & Berezinski, P. (۲۰۱۹). TAG: Topological ...
  • Aissa, A., Abdalla, I., Hussein, L., & Elhadad, A. (۲۰۲۰). ...
  • Frigault, M., & Wang, L. (۲۰۰۸). Measuring Network Security Using ...
  • Khosravi-Farmad, M., & Ghaemi-Bafghi, A. (۲۰۲۰). Bayesian Decision Network-Based Security ...
  • Chung, C. J., Khatkar, P., Xing, T., Lee, J., & ...
  • Wang, L., Jajodia, S., Singhal, A., & Noel, S. (۲۰۱۰). ...
  • Albanese, M., & Jajodia, S. (۲۰۱۸). A graphical model to ...
  • Motzek, A., & Moller, R. (۲۰۱۷). Context-and bias-free probabilistic mission ...
  • Kheir, N., Cuppens-Boulahia, N., Cuppens, F., & Debar, H. (۲۰۱۰). ...
  • Tadda, G. P., & Salerno, J. S. (۲۰۰۹). Overview of ...
  • Zand, A., Houmansadr, A., Vigna, G., Kemmerer, R., & Kruegel, ...
  • Yang, T., Shen, J., Su, Y., Ling, X., Yang, Y., ...
  • Yin, J., Zhao, X., Tang, Y., Zhi, C., Chen, Z., ...
  • . FarahaniNia, S., Dehghan, M., Sadeghiyan, B., and Niksefat, S. ...
  • Shirazi, A., Kazemi, M. (۲۰۲۰). A New Model for Information ...
  • Rongrong, X., Xiaochun, Y., Zhiyu, H. (۲۰۱۹). A Framework for ...
  • Saaty, T. L. (۱۹۸۸). What is the analytic hierarchy process? ...
  • Saaty, T. L., Vargas, L. G., Saaty, T. L., & ...
  • Doynikova, E., & Kotenko, I. (۲۰۱۶). Countermeasure selection based on ...
  • Hornik, K., Stinchcombe, M., & White, H. (۱۹۸۹). Multilayer feedforward ...
  • نمایش کامل مراجع