Quantitative Metrics and Risk Assessment: The Three Tenets Model of Cybersecurity
Progress in operational cybersecurity has been difficult to demonstrate. In spite of the considerable research and development investments made for more than 30 years, many government, industrial, financial, and consumer information systems continue to be successfully attacked and exploited on a rou...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Carleton University
2013-08-01
|
Series: | Technology Innovation Management Review |
Subjects: | |
Online Access: | http://timreview.ca/sites/default/files/article_PDF/HughesCybenko_TIMReview_August2013.pdf |
id |
doaj-7b2d5bc4f5d44ddc8fc5cd5a0adca9c4 |
---|---|
record_format |
Article |
spelling |
doaj-7b2d5bc4f5d44ddc8fc5cd5a0adca9c42020-11-24T22:44:09ZengCarleton UniversityTechnology Innovation Management Review1927-03212013-08-01August 2013: Cybersecurity1524Quantitative Metrics and Risk Assessment: The Three Tenets Model of CybersecurityJeff HughesGeorge CybenkoProgress in operational cybersecurity has been difficult to demonstrate. In spite of the considerable research and development investments made for more than 30 years, many government, industrial, financial, and consumer information systems continue to be successfully attacked and exploited on a routine basis. One of the main reasons that progress has been so meagre is that most technical cybersecurity solutions that have been proposed to-date have been point solutions that fail to address operational tradeoffs, implementation costs, and consequent adversary adaptations across the full spectrum of vulnerabilities. Furthermore, sound prescriptive security principles previously established, such as the Orange Book, have been difficult to apply given current system complexity and acquisition approaches. To address these issues, the authors have developed threat-based descriptive methodologies to more completely identify system vulnerabilities, to quantify the effectiveness of possible protections against those vulnerabilities, and to evaluate operational consequences and tradeoffs of possible protections. This article begins with a discussion of the tradeoffs among seemingly different system security properties such as confidentiality, integrity, and availability. We develop a quantitative framework for understanding these tradeoffs and the issues that arise when those security properties are all in play within an organization. Once security goals and candidate protections are identified, risk/benefit assessments can be performed using a novel multidisciplinary approach, called “QuERIES.” The article ends with a threat-driven quantitative methodology, called “The Three Tenets”, for identifying vulnerabilities and countermeasures in networked cyber-physical systems. The goal of this article is to offer operational guidance, based on the techniques presented here, for informed decision making about cyber-physical system security. http://timreview.ca/sites/default/files/article_PDF/HughesCybenko_TIMReview_August2013.pdfavailabilityconfidentialityintegrityquantitative cybersecurityrisk assessmentvulnerabilities |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Jeff Hughes George Cybenko |
spellingShingle |
Jeff Hughes George Cybenko Quantitative Metrics and Risk Assessment: The Three Tenets Model of Cybersecurity Technology Innovation Management Review availability confidentiality integrity quantitative cybersecurity risk assessment vulnerabilities |
author_facet |
Jeff Hughes George Cybenko |
author_sort |
Jeff Hughes |
title |
Quantitative Metrics and Risk Assessment: The Three Tenets Model of Cybersecurity |
title_short |
Quantitative Metrics and Risk Assessment: The Three Tenets Model of Cybersecurity |
title_full |
Quantitative Metrics and Risk Assessment: The Three Tenets Model of Cybersecurity |
title_fullStr |
Quantitative Metrics and Risk Assessment: The Three Tenets Model of Cybersecurity |
title_full_unstemmed |
Quantitative Metrics and Risk Assessment: The Three Tenets Model of Cybersecurity |
title_sort |
quantitative metrics and risk assessment: the three tenets model of cybersecurity |
publisher |
Carleton University |
series |
Technology Innovation Management Review |
issn |
1927-0321 |
publishDate |
2013-08-01 |
description |
Progress in operational cybersecurity has been difficult to demonstrate. In spite of the considerable research and development investments made for more than 30 years, many government, industrial, financial, and consumer information systems continue to be successfully attacked and exploited on a routine basis. One of the main reasons that progress has been so meagre is that most technical cybersecurity solutions that have been proposed to-date have been point solutions that fail to address operational tradeoffs, implementation costs, and consequent adversary adaptations across the full spectrum of vulnerabilities. Furthermore, sound prescriptive security principles previously established, such as the Orange Book, have been difficult to apply given current system complexity and acquisition approaches. To address these issues, the authors have developed threat-based descriptive methodologies to more completely identify system vulnerabilities, to quantify the effectiveness of possible protections against those vulnerabilities, and to evaluate operational consequences and tradeoffs of possible protections. This article begins with a discussion of the tradeoffs among seemingly different system security properties such as confidentiality, integrity, and availability. We develop a quantitative framework for understanding these tradeoffs and the issues that arise when those security properties are all in play within an organization. Once security goals and candidate protections are identified, risk/benefit assessments can be performed using a novel multidisciplinary approach, called “QuERIES.” The article ends with a threat-driven quantitative methodology, called “The Three Tenets”, for identifying vulnerabilities and countermeasures in networked cyber-physical systems. The goal of this article is to offer operational guidance, based on the techniques presented here, for informed decision making about cyber-physical system security. |
topic |
availability confidentiality integrity quantitative cybersecurity risk assessment vulnerabilities |
url |
http://timreview.ca/sites/default/files/article_PDF/HughesCybenko_TIMReview_August2013.pdf |
work_keys_str_mv |
AT jeffhughes quantitativemetricsandriskassessmentthethreetenetsmodelofcybersecurity AT georgecybenko quantitativemetricsandriskassessmentthethreetenetsmodelofcybersecurity |
_version_ |
1725692805982978048 |