Application of a risk-based approach using reflexive risk models in building information security systems

dc.contributor.authorArkhypov, Oleksandr
dc.contributor.authorGregus, Michal
dc.contributor.authorArkhypova, Yevheniia
dc.date.accessioned2021-06-14T13:14:34Z
dc.date.available2021-06-14T13:14:34Z
dc.date.issued2020
dc.description.abstractenThe risk-based approach (RBA) provides certain advantages in the construction and operation of information security management systems, therefore, the most frequently applied standards in this area are based on it. But the practical application of RBA for protection against cyber threats is fraught with a number of difficulties and limits. It is shown that application of a detailed risk assessment to assess the information security in organization intensively using the Internet and other IT in its activities, require a lengthy work to investigate vulnerabilities, calculating the private risks, reducing them into risks of threat. Taking into account the extremely high labor costs of this procedure, it is relevant to solve the problem by assessing high-level risks. Four verbal specifications of the attacker are introduced, describing various aspects of his behavior and skills, the socio-psychological context of his actions, the target settings of these actions, affecting the choice of the attacker's strategy, methods and ways to implement information threats. On the basis of these specifications reflexive risk models are formed. These are mathematical models whose structure and parameters reflect the characteristics of the attacker contained in its specification. Each of these models can be tailored to its own security policy to minimize losses to the organization. The study of reflexive models in a number of cases made it possible to determine the maximum volume of investments in the information security system and reveal the limitations in the application of the RBA to the construction of the information security system.uk
dc.format.pagerangeP. 130-143uk
dc.identifier.citationArkhypov, O. Application of a risk-based approach using reflexive risk models in building information security systems / Oleksandr Arkhypov, Michal Gregus, Yevheniia Arkhypova // Proceedings of the 1st International Workshop on Computational & Information Technologies for Risk-Informed Systems (CITRisk 2020). Kherson, Ukraine, October 15-16, 2020. – Kherson, 2020. – Pp. 130-143.uk
dc.identifier.urihttps://ela.kpi.ua/handle/123456789/41515
dc.language.isoenuk
dc.publisher.placeKhersonuk
dc.sourceCEUR workshop proceedingsuk
dc.subjectrisk-based approachuk
dc.subjectinvestmentsuk
dc.subjectreflexive risk modelsuk
dc.subjecthackeruk
dc.subjectinformation securityuk
dc.subjectбезопасность информацииuk
dc.subjectбезпека інформаціїuk
dc.subjectинформационная безопасностьuk
dc.subjectриск-ориентированный подходuk
dc.subjectрефлексивные рискиuk
dc.subjectризик-орієнтований підхідuk
dc.subjectрефлексивні ризикиuk
dc.titleApplication of a risk-based approach using reflexive risk models in building information security systemsuk
dc.typeArticleuk

Файли

Контейнер файлів
Зараз показуємо 1 - 1 з 1
Вантажиться...
Ескіз
Назва:
CITRisk_Risk-Based Approach.pdf
Розмір:
635.07 KB
Формат:
Adobe Portable Document Format
Опис:
Ліцензійна угода
Зараз показуємо 1 - 1 з 1
Ескіз недоступний
Назва:
license.txt
Розмір:
9.01 KB
Формат:
Item-specific license agreed upon to submission
Опис: