A Cost-Optimization Scheme Using Security Vulnerability Measurement for Efficient Security Enhancement


Jun-Young Park, Eui-Nam Huh, Journal of Information Processing Systems Vol. 16, No. 1, pp. 61-82, Feb. 2020  

https://doi.org/10.3745/JIPS.02.0128
Keywords: Attack Graph, Cloud Security, Cost Optimization, Vulnerability Measurement
Fulltext:

Abstract

The security risk management used by some service providers is not appropriate for effective security enhancement. The reason is that the security risk management methods did not take into account the opinions of security experts, types of service, and security vulnerability-based risk assessment. Moreover, the security risk assessment method, which has a great influence on the risk treatment method in an information security risk assessment model, should be security risk assessment for fine-grained risk assessment, considering security vulnerability rather than security threat. Therefore, we proposed an improved information security risk management model and methods that consider vulnerability-based risk assessment and mitigation to enhance security controls considering limited security budget. Moreover, we can evaluate the security cost allocation strategies based on security vulnerability measurement that consider the security weight.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.




Cite this article
[APA Style]
Park, J. & Huh, E. (2020). A Cost-Optimization Scheme Using Security Vulnerability Measurement for Efficient Security Enhancement. Journal of Information Processing Systems, 16(1), 61-82. DOI: 10.3745/JIPS.02.0128.

[IEEE Style]
J. Park and E. Huh, "A Cost-Optimization Scheme Using Security Vulnerability Measurement for Efficient Security Enhancement," Journal of Information Processing Systems, vol. 16, no. 1, pp. 61-82, 2020. DOI: 10.3745/JIPS.02.0128.

[ACM Style]
Jun-Young Park and Eui-Nam Huh. 2020. A Cost-Optimization Scheme Using Security Vulnerability Measurement for Efficient Security Enhancement. Journal of Information Processing Systems, 16, 1, (2020), 61-82. DOI: 10.3745/JIPS.02.0128.