首页> 外文会议>European Conference on Cyber Warfare and Security >Cyber Security Risk Modelling and Assessment: A Quantitative Approach
【24h】

Cyber Security Risk Modelling and Assessment: A Quantitative Approach

机译:网络安全风险建模与评估:定量方法

获取原文

摘要

The extensive use of information systems has become both a crucial enabler and a critical vulnerability in all spheres of public and private activities. A cyber-security breach may result in interruption, modification, degradation, fabrication, interception, and unauthorized use of an information asset. The resulting damage can be immediate causing direct financial losses or prospective gradually harming the national safety and reputation. In the context of cyber security, risk is present where a threat intersects with a corresponding vulnerability which allows it to manifest. It can be formally expressed as a function of three elements: Probability that a threat may become harmful, Probability that a vulnerability may be exploited, and Resulting impact. While these three elements can be expressed either qualitatively or quantitatively, they are generally described in qualitative terms in the context of cyber security. This paper presents common cyber security risk assessment methods and shows how a risk analysis can be conducted in cyberspace. It proposes a new cyber risk formulation combining statistical and Monte Carlo simulation techniques. Risk analysis is defined here as a process that aims to identify, analyze, and reduce or transfer risk. A case study using the most common threats, vulnerabilities, and impacts is presented to illustrate the approach. In this study, a Program Evaluation and Review Technique (PERT) distribution is used to represent the inherent risk curve. A correlation analysis using stochastic simulation is conducted to show how sensitive the overall risk is to the different threats. Risk drivers are therefore assessed and displayed graphically using a pairwise association. The paper results and insights can assist civilian and military decision-makers in identifying critical risk drivers and the need for contingency plans. Statistical techniques and Monte Carlo simulation objectively derive the most likely cyber risk profile. The Loss Exceedance Curve shows for each loss the likelihood of exceeding it. The what-if analysis determines which risk mitigation strategies would have the most impact.
机译:信息系统的广泛使用已成为关键的推动因素和公共和私人活动的所有领域的关键漏洞。网络安全漏洞可能导致中断,修改,劣化,制造,拦截和未经授权使用信息资产。由此产生的损害可以立即导致直接的经济损失或前瞻性逐步损害国家安全和声誉。在网络安全的背景下,存在风险,其中威胁与相应的漏洞相交,这允许它表现出来。它可以正式表达为三个元素的函数:威胁可能变得有害的概率,可能会被利用漏洞的概率,并产生影响。虽然这三个元素可以定性或定量表示,但它们通常在网络安全的背景下以定性术语描述。本文介绍了普通的网络安全风险评估方法,并显示了如何在网络空间中进行风险分析。它提出了一种新的网络风险制定,结合了统计和蒙特卡罗仿真技术。风险分析在此定义为旨在识别,分析和降低或转移风险的过程。采用最常见的威胁,漏洞和影响的案例研究以说明这种方法。在本研究中,程序评估和审查技术(Pert)分布用于表示固有的风险曲线。进行了使用随机仿真的相关性分析,以显示整体风险对不同威胁的敏感程度。因此,使用成对关联在图形上评估和显示风险驱动程序。纸质结果和见解可以帮助民用和军事决策者确定危急风险驱动因素以及需要应急计划的必要性。统计技术和蒙特卡罗模拟客观地导出了最可能的网络风险配置文件。损失超出曲线显示每次损失超过它的可能性。什么分析确定哪些风险缓解策略将产生最大的影响。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号