首页 | 本学科首页   官方微博 | 高级检索  
     


Quantifying information security risks using expert judgment elicitation
Authors:Julie J.C.H. RyanThomas A. Mazzuchi  Daniel J. RyanJuliana Lopez de la Cruz  Roger Cooke
Affiliation:a School of Engineering and Applied Science, The George Washington University, USA
b Information Resources Management College, National Defense University, USA
c Delft University of Technology, Netherlands
d Resources for the Future, USA
Abstract:In the information security business, 30 years of practical and theoretical research has resulted in a fairly sophisticated appreciation for how to judge the qualitative level of risk faced by an enterprise. Based upon that understanding, there is a practical level of protection that a competent security manager can architect for a given enterprise. It would, of course, be better to use a quantitative approach to risk management, but, unfortunately, sufficient quantitative data that has been scientifically collected and analyzed does not exist. There have been many attempts to develop quantitative data using traditional quantitative methods, such as experiments, surveys, and observations, but there are significant weaknesses apparent in each approach. The research described in this paper was constructed to explore the utility of applying the well-established method of expert judgment elicitation to the field of information security. The instrument for eliciting the expert judgments was developed by two information security specialists and two expert judgment analysis specialists. The resultant instrument was validated using a small set of information security experts. The final instrument was used to elicit answers to both the calibration and judgment questions through structured interviews. The data was compiled and analyzed by a specialist in expert judgment analysis. This research illustrates the development of prior distributions for the parameters of models for cyber attacks and uses expert judgment results to develop the distributions.
Keywords:Information security   Risk management   Probability distributions   Expert elicitation   Poisson processes
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号