Multi-Criteria Selection of Capability-Based Cybersecurity Solutions
dc.contributor.author | Llanso, Thomas | |
dc.contributor.author | McNeil, Martha | |
dc.contributor.author | Noteboom, Cherie | |
dc.date.accessioned | 2019-01-03T00:59:23Z | |
dc.date.available | 2019-01-03T00:59:23Z | |
dc.date.issued | 2019-01-08 | |
dc.description.abstract | Given the increasing frequency and severity of cyber attacks on information systems of all kinds, there is interest in rationalized approaches for selecting the “best” set of cybersecurity mitigations. However, what is best for one target environment is not necessarily best for another. This paper examines an approach to the selection that uses a set of weighted criteria, where the security engineer sets the weights based on organizational priorities and constraints. The approach is based on a capability-based representation for defensive solutions. The paper discusses a group of artifacts that compose the approach through the lens of Design Science research and reports performance results of an instantiation artifact. | |
dc.format.extent | 9 pages | |
dc.identifier.doi | 10.24251/HICSS.2019.879 | |
dc.identifier.isbn | 978-0-9981331-2-6 | |
dc.identifier.uri | http://hdl.handle.net/10125/60169 | |
dc.language.iso | eng | |
dc.relation.ispartof | Proceedings of the 52nd Hawaii International Conference on System Sciences | |
dc.rights | Attribution-NonCommercial-NoDerivatives 4.0 International | |
dc.rights.uri | https://creativecommons.org/licenses/by-nc-nd/4.0/ | |
dc.subject | Cybersecurity and Software Assurance | |
dc.subject | Software Technology | |
dc.subject | decision-making, multi-criteria, cybersecurity, risk, capability | |
dc.title | Multi-Criteria Selection of Capability-Based Cybersecurity Solutions | |
dc.type | Conference Paper | |
dc.type.dcmi | Text |
Files
Original bundle
1 - 1 of 1