Quantitative Metrics and Risk Assessment: The Three Tenets Model of Cybersecurity

Progress in operational cybersecurity has been difficult to demonstrate. In spite of the considerable research and development investments made for more than 30 years, many government, industrial, financial, and consumer information systems continue to be successfully attacked and exploited on a rou...

Full description

Bibliographic Details
Main Authors: Jeff Hughes, George Cybenko
Format: Article
Language:English
Published: Carleton University 2013-08-01
Series:Technology Innovation Management Review
Subjects:
Online Access:http://timreview.ca/sites/default/files/article_PDF/HughesCybenko_TIMReview_August2013.pdf
id doaj-7b2d5bc4f5d44ddc8fc5cd5a0adca9c4
record_format Article
spelling doaj-7b2d5bc4f5d44ddc8fc5cd5a0adca9c42020-11-24T22:44:09ZengCarleton UniversityTechnology Innovation Management Review1927-03212013-08-01August 2013: Cybersecurity1524Quantitative Metrics and Risk Assessment: The Three Tenets Model of CybersecurityJeff HughesGeorge CybenkoProgress in operational cybersecurity has been difficult to demonstrate. In spite of the considerable research and development investments made for more than 30 years, many government, industrial, financial, and consumer information systems continue to be successfully attacked and exploited on a routine basis. One of the main reasons that progress has been so meagre is that most technical cybersecurity solutions that have been proposed to-date have been point solutions that fail to address operational tradeoffs, implementation costs, and consequent adversary adaptations across the full spectrum of vulnerabilities. Furthermore, sound prescriptive security principles previously established, such as the Orange Book, have been difficult to apply given current system complexity and acquisition approaches. To address these issues, the authors have developed threat-based descriptive methodologies to more completely identify system vulnerabilities, to quantify the effectiveness of possible protections against those vulnerabilities, and to evaluate operational consequences and tradeoffs of possible protections. This article begins with a discussion of the tradeoffs among seemingly different system security properties such as confidentiality, integrity, and availability. We develop a quantitative framework for understanding these tradeoffs and the issues that arise when those security properties are all in play within an organization. Once security goals and candidate protections are identified, risk/benefit assessments can be performed using a novel multidisciplinary approach, called “QuERIES.” The article ends with a threat-driven quantitative methodology, called “The Three Tenets”, for identifying vulnerabilities and countermeasures in networked cyber-physical systems. The goal of this article is to offer operational guidance, based on the techniques presented here, for informed decision making about cyber-physical system security. http://timreview.ca/sites/default/files/article_PDF/HughesCybenko_TIMReview_August2013.pdfavailabilityconfidentialityintegrityquantitative cybersecurityrisk assessmentvulnerabilities
collection DOAJ
language English
format Article
sources DOAJ
author Jeff Hughes
George Cybenko
spellingShingle Jeff Hughes
George Cybenko
Quantitative Metrics and Risk Assessment: The Three Tenets Model of Cybersecurity
Technology Innovation Management Review
availability
confidentiality
integrity
quantitative cybersecurity
risk assessment
vulnerabilities
author_facet Jeff Hughes
George Cybenko
author_sort Jeff Hughes
title Quantitative Metrics and Risk Assessment: The Three Tenets Model of Cybersecurity
title_short Quantitative Metrics and Risk Assessment: The Three Tenets Model of Cybersecurity
title_full Quantitative Metrics and Risk Assessment: The Three Tenets Model of Cybersecurity
title_fullStr Quantitative Metrics and Risk Assessment: The Three Tenets Model of Cybersecurity
title_full_unstemmed Quantitative Metrics and Risk Assessment: The Three Tenets Model of Cybersecurity
title_sort quantitative metrics and risk assessment: the three tenets model of cybersecurity
publisher Carleton University
series Technology Innovation Management Review
issn 1927-0321
publishDate 2013-08-01
description Progress in operational cybersecurity has been difficult to demonstrate. In spite of the considerable research and development investments made for more than 30 years, many government, industrial, financial, and consumer information systems continue to be successfully attacked and exploited on a routine basis. One of the main reasons that progress has been so meagre is that most technical cybersecurity solutions that have been proposed to-date have been point solutions that fail to address operational tradeoffs, implementation costs, and consequent adversary adaptations across the full spectrum of vulnerabilities. Furthermore, sound prescriptive security principles previously established, such as the Orange Book, have been difficult to apply given current system complexity and acquisition approaches. To address these issues, the authors have developed threat-based descriptive methodologies to more completely identify system vulnerabilities, to quantify the effectiveness of possible protections against those vulnerabilities, and to evaluate operational consequences and tradeoffs of possible protections. This article begins with a discussion of the tradeoffs among seemingly different system security properties such as confidentiality, integrity, and availability. We develop a quantitative framework for understanding these tradeoffs and the issues that arise when those security properties are all in play within an organization. Once security goals and candidate protections are identified, risk/benefit assessments can be performed using a novel multidisciplinary approach, called “QuERIES.” The article ends with a threat-driven quantitative methodology, called “The Three Tenets”, for identifying vulnerabilities and countermeasures in networked cyber-physical systems. The goal of this article is to offer operational guidance, based on the techniques presented here, for informed decision making about cyber-physical system security.
topic availability
confidentiality
integrity
quantitative cybersecurity
risk assessment
vulnerabilities
url http://timreview.ca/sites/default/files/article_PDF/HughesCybenko_TIMReview_August2013.pdf
work_keys_str_mv AT jeffhughes quantitativemetricsandriskassessmentthethreetenetsmodelofcybersecurity
AT georgecybenko quantitativemetricsandriskassessmentthethreetenetsmodelofcybersecurity
_version_ 1725692805982978048