Skip to Main content Skip to Navigation
Conference papers

On Identifying Proper Security Mechanisms

Abstract : Selection of proper security mechanisms that will protect the organization’s assets against cyber threats is an important non-trivial problem. This paper introduces the approach based on statistical methods that will help to choose the proper controls with respect to actual security threats. First, we determine security mechanisms that support control objectives from ISO/IEC 27002 standard and assign them meaningful weights. Then we employ a factor analysis to reveal dependencies among control objectives. Then this knowledge can be reflected to security mechanisms, that inherit these dependencies from control objectives.
Complete list of metadata
Contributor : Hal Ifip Connect in order to contact the contributor
Submitted on : Wednesday, March 1, 2017 - 11:04:48 AM
Last modification on : Thursday, March 2, 2017 - 1:04:26 AM
Long-term archiving on: : Tuesday, May 30, 2017 - 2:21:10 PM


Files produced by the author(s)


Distributed under a Creative Commons Attribution 4.0 International License



Jakub Breier, Ladislav Hudec. On Identifying Proper Security Mechanisms. 1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.285-294, ⟨10.1007/978-3-642-36818-9_29⟩. ⟨hal-01480182⟩



Record views


Files downloads