A Causal Model for Information Security Risk Assessment

Loading...
Publication Logo

Date

2010

Authors

Kondakçı, Süleyman

Journal Title

Journal ISSN

Volume Title

Publisher

Open Access Color

Green Open Access

No

OpenAIRE Downloads

OpenAIRE Views

Publicly Funded

No
Impulse
Average
Influence
Top 10%
Popularity
Average

Research Projects

Journal Issue

Abstract

This paper presents a probabilistic approach to encode causal relationships among various threat sources and victim systems in order to facilitate quantitative and relational security assessment of information systems. In addition to providing a simple risk analysis approach compared to qualitative methods, it is unique in that it makes no a priori assumptions regarding the test domain. Therefore, it applies equally well to a variety of information systems, software development projects, IT products, and other decision making systems. The entire framework proposes a unique concept to analyse dependence and causality within a network of interdependent assets. Security risk management is mostly considered by security certification authorities, test and evaluation facilities, and some organizations such as CC, CCITT, and ISACA. In order to invent new methods that can facilitate security management, we need to consider risk assessment as a major research topic for evaluation facilities. © 2010 IEEE.

Description

2010 6th International Conference on Information Assurance and Security, IAS 2010 -- 23 August 2010 through 25 August 2010 -- Atlanta, GA -- 82434

Keywords

Risk modeling, Security analysis, Test methods and tools, Uncertainty inference, Analysis approach, Causal model, Causal relationships, Decision-making systems, Information security risk assessment, IT products, Probabilistic approaches, Qualitative method, Research topics, Risk modeling, Security analysis, Security assessment, Security certification, Security management, Software development projects, Test and evaluation, Test method, Uncertainty inference, Information systems, Quality control, Risk analysis, Risk assessment, Risk management, Risk perception, Security systems, Software design, Uncertainty analysis, Security of data

Fields of Science

0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology

Citation

WoS Q

N/A

Scopus Q

N/A
OpenCitations Logo
OpenCitations Citation Count
8

Source

2010 6th International Conference on Information Assurance and Security, IAS 2010

Volume

Issue

Start Page

143

End Page

148
PlumX Metrics
Citations

CrossRef : 7

Scopus : 13

Captures

Mendeley Readers : 33

SCOPUS™ Citations

13

checked on Mar 24, 2026

Google Scholar Logo
Google Scholar™
OpenAlex Logo
OpenAlex FWCI
3.48221308

Sustainable Development Goals