Skip to Main content Skip to Navigation
Conference papers

On Identifying Proper Security Mechanisms

Abstract : Selection of proper security mechanisms that will protect the organization’s assets against cyber threats is an important non-trivial problem. This paper introduces the approach based on statistical methods that will help to choose the proper controls with respect to actual security threats. First, we determine security mechanisms that support control objectives from ISO/IEC 27002 standard and assign them meaningful weights. Then we employ a factor analysis to reveal dependencies among control objectives. Then this knowledge can be reflected to security mechanisms, that inherit these dependencies from control objectives.
Complete list of metadata

https://hal.inria.fr/hal-01480182
Contributor : Hal Ifip <>
Submitted on : Wednesday, March 1, 2017 - 11:04:48 AM
Last modification on : Thursday, March 2, 2017 - 1:04:26 AM
Long-term archiving on: : Tuesday, May 30, 2017 - 2:21:10 PM

File

978-3-642-36818-9_29_Chapter.p...
Files produced by the author(s)

Licence


Distributed under a Creative Commons Attribution 4.0 International License

Identifiers

Citation

Jakub Breier, Ladislav Hudec. On Identifying Proper Security Mechanisms. 1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.285-294, ⟨10.1007/978-3-642-36818-9_29⟩. ⟨hal-01480182⟩

Share

Metrics

Record views

264

Files downloads

296