کد مقاله کد نشریه سال انتشار مقاله انگلیسی نسخه تمام متن
552109 873176 2013 9 صفحه PDF دانلود رایگان
عنوان انگلیسی مقاله ISI
Selection of optimal countermeasure portfolio in IT security planning
موضوعات مرتبط
مهندسی و علوم پایه مهندسی کامپیوتر سیستم های اطلاعاتی
پیش نمایش صفحه اول مقاله
Selection of optimal countermeasure portfolio in IT security planning
چکیده انگلیسی

This paper deals with the optimal selection of countermeasures in IT security planning to prevent or mitigate cyber-threats and a mixed integer programming approach is proposed for the decision making. Given a set of potential threats and a set of available countermeasures, the decision maker needs to decide which countermeasure to implement under limited budget to minimize potential losses from successful cyber-attacks and mitigate the impact of disruptions caused by IT security incidents. The selection of countermeasures is based on their effectiveness of blocking different threats, implementation costs and probability of potential attack scenarios. The problem is formulated as a single- or bi-objective mixed integer program and a conditional value-at-risk approach combined with scenario-based analysis is applied to control the risk of high losses due to operational disruptions and optimize worst-case performance of an IT system. The bi-objective trade-off model provides the decision maker with a simple tool for balancing expected and worst-case losses and for shaping of the resulting cost distribution through the selection of optimal subset of countermeasures for implementation, i.e., the selection of optimal countermeasure portfolio. The selected portfolio explicitly depends on preferred confidence level and cost/risk preference of the decision maker. Numerical examples are presented and some computational results are reported to compare the risk-averse solutions that minimize conditional value-at-risk with the risk-neutral ones that minimize expected cost.


► MIP and CVaR are applied for selection of countermeasures to mitigate impact of IT security incidents.
► Risk-neutral vs. risk-averse solution and the corresponding performance of an IT system are compared.
► The trade-off model: mean cost-CVaR is recommended for the decision making.

ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: Decision Support Systems - Volume 55, Issue 1, April 2013, Pages 156–164
نویسندگان
,