Literature DB >> 28800378

Security Events and Vulnerability Data for Cybersecurity Risk Estimation.

Luca Allodi1, Fabio Massacci2.   

Abstract

Current industry standards for estimating cybersecurity risk are based on qualitative risk matrices as opposed to quantitative risk estimates. In contrast, risk assessment in most other industry sectors aims at deriving quantitative risk estimations (e.g., Basel II in Finance). This article presents a model and methodology to leverage on the large amount of data available from the IT infrastructure of an organization's security operation center to quantitatively estimate the probability of attack. Our methodology specifically addresses untargeted attacks delivered by automatic tools that make up the vast majority of attacks in the wild against users and organizations. We consider two-stage attacks whereby the attacker first breaches an Internet-facing system, and then escalates the attack to internal systems by exploiting local vulnerabilities in the target. Our methodology factors in the power of the attacker as the number of "weaponized" vulnerabilities he/she can exploit, and can be adjusted to match the risk appetite of the organization. We illustrate our methodology by using data from a large financial institution, and discuss the significant mismatch between traditional qualitative risk assessments and our quantitative approach.
© 2017 Society for Risk Analysis.

Keywords:  Attack likelihood; cybersecurity events; quantitative risk; vulnerabilities

Year:  2017        PMID: 28800378     DOI: 10.1111/risa.12864

Source DB:  PubMed          Journal:  Risk Anal        ISSN: 0272-4332            Impact factor:   4.000


  3 in total

1.  Stochastic Counterfactual Risk Analysis for the Vulnerability Assessment of Cyber-Physical Attacks on Electricity Distribution Infrastructure Networks.

Authors:  Edward J Oughton; Daniel Ralph; Raghav Pant; Eireann Leverett; Jennifer Copic; Scott Thacker; Rabia Dada; Simon Ruffle; Michelle Tuveson; Jim W Hall
Journal:  Risk Anal       Date:  2019-02-27       Impact factor: 4.000

2.  An Adversarial Risk Analysis Framework for Cybersecurity.

Authors:  David Rios Insua; Aitor Couce-Vieira; Jose A Rubio; Wolter Pieters; Katsiaryna Labunets; Daniel G Rasines
Journal:  Risk Anal       Date:  2019-06-10       Impact factor: 4.000

3.  The Work-Averse Cyberattacker Model: Theory and Evidence from Two Million Attack Signatures.

Authors:  Luca Allodi; Fabio Massacci; Julian Williams
Journal:  Risk Anal       Date:  2021-05-07       Impact factor: 4.302

  3 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.