跳至主要内容

A Conceptual Framework for Threat Assessment Based on Organization’s Information Security Policy

Read full paper at:
www.scirp.org/journal/PaperInformation.aspx?PaperID=50218#.VDINCVfHRK0

The security breaches of sensitive information have remained difficult to solve due to increased malware programs and unauthorized access to data stored in critical assets. As risk appetite differ from one organization to another, it prompts the threat analysis tools be integrated with organization’s information security policy so as to ensure security controls at local settings. However, it has been noted that the current tools for threat assessment processes have not encompassed information security policy for effective security management (i.e. confidentiality, integrity and availability) based on organization’s risk appetite and culture. The information security policy serves as a tool to provide guidance on how to manage and secure all business operations including critical assets, infrastructure and people in the organization. This guidance (e.g. usage and controls) facilitates the provisions for threat assessment and compliance based on local context. The lack of effective threat assessment frameworks at local context have promoted the exposure of critical assets such as database servers, mails servers, web servers and user smart-devices at the hand of attackers and thus increase risks and probability to compromise the assets. In this paper we have proposed a conceptual framework for security threat assessment based on organization’s information security policy. Furthermore, the study proposed the policy automation canvas for provision of a methodology to alert the security managers what possible threats found in their organizations for quick security mitigation without depending on security expertise.
Cite this paper
Mbowe, J. , Zlotnikova, I. , Msanjila, S. and Oreku, G. (2014) A Conceptual Framework for Threat Assessment Based on Organization’s Information Security Policy. Journal of Information Security, 5, 166-177. doi: 10.4236/jis.2014.54016.
 

[1] Fink, D. (1994) A Security Framework for Information Systems Outsourcing. Information Management & Computer Security, 2, 3-8. http://dx.doi.org/10.1108/09685229410068235
[2] Symons, C. (2005) It Governance Framework. Forrester Best Practices, 29, 2005.
[3] Oreku, G.S. and Li, J. (2005) Rethinking e-Commerce Security. International Conference on Computational Intelligence for Modelling, Control and Automation and International Conference on Intelligent Agents, Web Technologies and Internet Commerce, Vol. 1, 223-228.
[4] Oreku, G.S. and Mbowe, J.E. (2014) Critical Infrastructure Protection. The International Conference on Digital Security and Forensics (DigitalSec2014), The Society of Digital Information and Wireless Communication.
[5] Yeboah, T. (2013) A Proposed Information Technology Audit Framework for Microfinance Kumasi. Journal of Engineering Computers & Applied Sciences, 2, 1-7.
[6] DBIR (2014) 2014 Data Breach Investigation Report. Verizon Document, Tech. Rep.
[7] Beckers, K., Faβbender, S., Hatebur, D., Heisel, M. and Coté, I. (2013) Common Criteria Compliant Software Development (cc-casd). Proceedings of the 28th Annual ACM Symposium on Applied Computing, 1298-1304.
[8] Alberts, C., Dorofee, A., Stevens, J. and Woody, C. (2003) Introduction to the Octave Approach. Carnegie Mellon University, Pittsburgh.
[9] den Braber, F., Hogganvik, I., Lund, M., Stolen, K. and Vraalsen, F. (2007) Model-Based Security Analysis in Seven Stepsa Guided Tour to the CORAS Method. BT Technology Journal, 25, 101-117.
http://dx.doi.org/10.1007/s10550-007-0013-9
[10] Scandariato, R., Wuyts, K. and Joosen, W. (2014) A Descriptive Study of Microsoft Threat Modeling Technique. Requirements Engineering, 1-18.
[11] Sommestad, T., Ekstedt, M. and Holm, H. (2013) The Cyber Security Modeling Language: A Tool for Assessing the Vulnerability of Enterprise System Architectures. Systems Journal, 7, 363-373. http://dx.doi.org/10.1109/JSYST.2012.2221853
[12] Keating, C.G. (2014) Validating the Octave Allegro Information Systems Risk Assessment Methodology: A Case Study. Ph.D. Dissertation, Nova Southeastern University.
[13] Abdullah, H. Ooda-Octave, a Novel Approach to Information Security Risk Analysis.
http://osprey.unisa.ac.za/TechnicalReports/h5.pdf
[14] Lund, M.S., Solhaug, B. and Stolen, K. (2011) A Guided Tour of the Coras Method. Model-Driven Risk Analysis, Springer, 23-43. http://dx.doi.org/10.1007/978-3-642-12323-8_3
[15] ISO 21827 Information Technology Security Techniques. Code of Practice for Information Security Management. http://www.sabs.co.za/content/uploads/files/SANS21827%28colour%29.pdf                                 eww141006lx
[16] De Bruin, T., Freeze, R., Kaulkarni, U. and Rosemann, M. (2005) Understanding the Main Phases of Developing a Maturity Assessment Model.

评论

此博客中的热门博文

A Comparison of Methods Used to Determine the Oleic/Linoleic Acid Ratio in Cultivated Peanut (Arachis hypogaea L.)

Cultivated peanut ( Arachis hypogaea L.) is an important oil and food crop. It is also a cheap source of protein, a good source of essential vitamins and minerals, and a component of many food products. The fatty acid composition of peanuts has become increasingly important with the realization that oleic acid content significantly affects the development of rancidity. And oil content of peanuts significantly affects flavor and shelf-life. Early generation screening of breeding lines for high oleic acid content greatly increases the efficiency of developing new peanut varieties. The objective of this study was to compare the accuracy of methods used to classify individual peanut seed as high oleic or not high oleic. Three hundred and seventy-four (374) seeds, spanning twenty-three (23) genotypes varying in oil composition (i.e. high oleic (H) or normal/not high oleic (NH) inclusive of all four peanut market-types (runner, Spanish, Valencia and Virginia), were individually tested ...

Location Optimization of a Coal Power Plant to Balance Costs against Plant’s Emission Exposure

Fuel and its delivery cost comprise the biggest expense in coal power plant operations. Delivery of electricity from generation to consumers requires investment in power lines and transmission grids. Placing a coal power plant or multiple power plants near dense population centers can lower transmission costs. If a coalmine is nearby, transportation costs can also be reduced. However, emissions from coal plants play a key role in worsening health crises in many countries. And coal upon combustion produces CO 2 , SO 2 , NO x , CO, Metallic and Particle Matter (PM10 & PM2.5). The presence of these chemical compounds in the atmosphere in close vicinity to humans, livestock, and agriculture carries detrimental health consequences. The goal of the research was to develop a methodology to minimize the public’s exposure to harmful emissions from coal power plants while maintaining minimal operational costs related to electric distribution losses and coal logistics. The objective was...

Evaluation of the Safety and Efficacy of Continuous Use of a Home-Use High-Frequency Facial Treatment Appliance

At present, many home-use beauty devices are available in the market. In particular, many products developed for facial treatment use light, e.g., a flash lamp or a light-emitting diode (LED). In this study, the safety of 4 weeks’ continuous use of NEWA TM , a high-frequency facial treatment appliance, every alternate day at home was verified, and its efficacy was evaluated in Japanese individuals with healthy skin aged 30 years or older who complained of sagging of the facial skin.  Transepidermal water loss (TEWL), melanin levels, erythema levels, sebum secretion levels, skin color changes and wrinkle improvement in the facial skin were measured before the appliance began to be used (study baseline), at 2 and 4 weeks after it had begun to be used, and at 2 weeks after completion of the 4-week treatment period (6 weeks from the study baseline). In addition, data obtained by subjective evaluation by the subjects themselves on a visual analog scale (VAS) were also analyzed. Fur...