Defining and computing a value based cyber-security measure

  • Authors:
  • Anis Ben Aissa;Robert K. Abercrombie;Frederick T. Sheldon;Ali Mili

  • Affiliations:
  • University of Tunis El Manar, Tunisia;Oak Ridge National Laboratory, Oak Ridge, TN;Oak Ridge National Laboratory, Oak Ridge, TN;New Jersey Institute of Technology, Newark NJ

  • Venue:
  • Proceedings of the Second Kuwait Conference on e-Services and e-Systems
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

In past work[1,3,4], we presented a value based measure of cybersecurity that quantifies the security of a system in concrete terms, specifically, in terms of how much each system stakeholder stands to lose (in dollars per hour of operation) as a result of security threats and system vulnerabilities\; our metric varies according to the stakes that each stakeholder has in meeting each security requirement. In this paper we discuss the specification and design of a system that collects, updates and maintains all the information that pertains to estimating our cybersecurity measure, and offers stakeholders quantitative means to make security-related decisions.