Towards the Intelligent Application of Security Controls

George Yee
{"title":"Towards the Intelligent Application of Security Controls","authors":"George Yee","doi":"10.1109/RAMS48030.2020.9153668","DOIUrl":null,"url":null,"abstract":"Today, attacks on sensitive data held by organizations and the resulting data breaches are unfortunately all too common. In response to these attacks the organization applies security controls (e.g., encryption) to secure its vulnerabilities. However, these controls are often applied haphazardly, without any idea of their reliability, or any guidance on how they should be applied to account for the priority of the vulnerabilities or a security control’s effect on the overall security posture of the organization. This work derives a mathematical model linking the reliability of the security controls to the overall security level of the organization. The paper then combines this model with a method to prioritize vulnerabilities, allowing the organization to more intelligently apply security controls and reach its desired security level goal within negotiated budgetary constraints. The paper illustrates this approach using an application example.","PeriodicalId":360096,"journal":{"name":"2020 Annual Reliability and Maintainability Symposium (RAMS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 Annual Reliability and Maintainability Symposium (RAMS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/RAMS48030.2020.9153668","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Today, attacks on sensitive data held by organizations and the resulting data breaches are unfortunately all too common. In response to these attacks the organization applies security controls (e.g., encryption) to secure its vulnerabilities. However, these controls are often applied haphazardly, without any idea of their reliability, or any guidance on how they should be applied to account for the priority of the vulnerabilities or a security control’s effect on the overall security posture of the organization. This work derives a mathematical model linking the reliability of the security controls to the overall security level of the organization. The paper then combines this model with a method to prioritize vulnerabilities, allowing the organization to more intelligently apply security controls and reach its desired security level goal within negotiated budgetary constraints. The paper illustrates this approach using an application example.
迈向安全控制的智能化应用
不幸的是,今天,对组织持有的敏感数据的攻击以及由此导致的数据泄露非常普遍。为了应对这些攻击,组织应用安全控制(例如,加密)来保护其漏洞。然而,这些控制通常是随意应用的,不知道它们的可靠性,也不知道如何应用它们来考虑漏洞的优先级或安全控制对组织整体安全状态的影响。这项工作派生出一个数学模型,将安全控制的可靠性与组织的整体安全级别联系起来。然后,本文将此模型与优先考虑漏洞的方法结合起来,允许组织更智能地应用安全控制,并在协商的预算限制内达到预期的安全级别目标。本文通过一个应用实例说明了这种方法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信