A Causal Model for Information Security Risk Assessment
Loading...
Files
Date
2010
Authors
Kondakçı, Süleyman
Journal Title
Journal ISSN
Volume Title
Publisher
Open Access Color
Green Open Access
No
OpenAIRE Downloads
OpenAIRE Views
Publicly Funded
No
Abstract
This paper presents a probabilistic approach to encode causal relationships among various threat sources and victim systems in order to facilitate quantitative and relational security assessment of information systems. In addition to providing a simple risk analysis approach compared to qualitative methods, it is unique in that it makes no a priori assumptions regarding the test domain. Therefore, it applies equally well to a variety of information systems, software development projects, IT products, and other decision making systems. The entire framework proposes a unique concept to analyse dependence and causality within a network of interdependent assets. Security risk management is mostly considered by security certification authorities, test and evaluation facilities, and some organizations such as CC, CCITT, and ISACA. In order to invent new methods that can facilitate security management, we need to consider risk assessment as a major research topic for evaluation facilities. © 2010 IEEE.
Description
2010 6th International Conference on Information Assurance and Security, IAS 2010 -- 23 August 2010 through 25 August 2010 -- Atlanta, GA -- 82434
Keywords
Risk modeling, Security analysis, Test methods and tools, Uncertainty inference, Analysis approach, Causal model, Causal relationships, Decision-making systems, Information security risk assessment, IT products, Probabilistic approaches, Qualitative method, Research topics, Risk modeling, Security analysis, Security assessment, Security certification, Security management, Software development projects, Test and evaluation, Test method, Uncertainty inference, Information systems, Quality control, Risk analysis, Risk assessment, Risk management, Risk perception, Security systems, Software design, Uncertainty analysis, Security of data
Fields of Science
0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology
Citation
WoS Q
N/A
Scopus Q
N/A

OpenCitations Citation Count
8
Source
2010 6th International Conference on Information Assurance and Security, IAS 2010
Volume
Issue
Start Page
143
End Page
148
PlumX Metrics
Citations
CrossRef : 7
Scopus : 13
Captures
Mendeley Readers : 33
SCOPUS™ Citations
13
checked on Mar 24, 2026
Google Scholar™


