A Quantitative Model of the Security Intrusion Process Based on Attacker Behavior
IEEE Transactions on Software Engineering
Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security
IEEE Transactions on Software Engineering
Survivability analysis of networked systems
ICSE '01 Proceedings of the 23rd International Conference on Software Engineering
Extend: the Extend simulation environment
Proceedings of the 32nd conference on Winter simulation
The economics of information security investment
ACM Transactions on Information and System Security (TISSEC)
Journal of Computer Security - IFIP 2000
Cyber defense technology networking and evaluation
Communications of the ACM - Homeland security
Honeypots: Practical Means to Validate Malicious Fault Assumptions
PRDC '04 Proceedings of the 10th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC'04)
Model-Based Validation of an Intrusion-Tolerant Information System
SRDS '04 Proceedings of the 23rd IEEE International Symposium on Reliable Distributed Systems
Evaluating information security investments using the analytic hierarchy process
Communications of the ACM - Medical image modeling
CyberCIEGE: Gaming for Information Assurance
IEEE Security and Privacy
An Experimental Evaluation to Determine if Port Scans are Precursors to an Attack
DSN '05 Proceedings of the 2005 International Conference on Dependable Systems and Networks
Modeling the Symptomatic Fixes Archetype in Enterprise Computer Security
COMPSAC '06 Proceedings of the 30th Annual International Computer Software and Applications Conference - Volume 01
Subjective-Cost policy routing
WINE'05 Proceedings of the First international conference on Internet and Network Economics
Hi-index | 0.00 |
The purpose of this study is to understand observed behavior and to diagnose and find solutions to issues encountered in organizational computer security using a systemic approach, namely system archetypes. In this paper we show the feasibility of archetypes application and the benefits of simulation. We developed a model and simulation of some aspects of security based on system dynamics principles. The system dynamics simulation model can be used in support of decision-making, training, and teaching regarding the mitigation of computer security risks. In this paper, we combine two archetypes and show the computer security relevance of such combinations. Presented are instances of the archetypes ''Escalation'', in which an organization must continuously increase its efforts to counter additional attacker effort; and ''Limits to Growth'', in which the gains from an organization's security efforts plateau or decline due to its limited capacity for security-related tasks. We describe a scenario where these archetypes (individually and combined) can help in diagnosis and understanding, and present simulation of ''what-if'' scenarios suggesting how an organization might remedy these problems and maximize its gains from security efforts.