메뉴 건너뛰기




Volumn 28, Issue 6, 2008, Pages 483-491

Quantitatively assessing the vulnerability of critical information systems: A new method for evaluating security enhancements

Author keywords

Information security; Information security measurement; Risk analysis; Security threats; Vulnerability measurement

Indexed keywords

INFORMATION SYSTEMS; INFORMATION USE; MANAGERS; RISK ANALYSIS; SCADA SYSTEMS; SECURITY OF DATA;

EID: 54949112031     PISSN: 02684012     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ijinfomgt.2008.01.009     Document Type: Article
Times cited : (69)

References (38)
  • 2
    • 54949107497 scopus 로고    scopus 로고
    • Alberts, C., Dorofee, A., Stevens, J., & Woody, C. (2003). Introduction to the OCTAVE approach. Retrieved, from 〈http://www.cert.org/octave/approach_intro.pdf〉.
    • Alberts, C., Dorofee, A., Stevens, J., & Woody, C. (2003). Introduction to the OCTAVE approach. Retrieved, from 〈http://www.cert.org/octave/approach_intro.pdf〉.
  • 4
    • 54949105179 scopus 로고    scopus 로고
    • Byres, E. & Lowe, J. (2004). The myths and facts behind cyber security risks for industrial control systems, In VDE Congress, Berlin, October 18-20, 213-218.
    • Byres, E. & Lowe, J. (2004). The myths and facts behind cyber security risks for industrial control systems, In VDE Congress, Berlin, October 18-20, 213-218.
  • 5
    • 0037599474 scopus 로고    scopus 로고
    • The economic cost of publicly announced information security breaches: empirical evidence from the stock market
    • Campbell K., Gordon L.A., Loeb M.P., and Zhou L. The economic cost of publicly announced information security breaches: empirical evidence from the stock market. Journal of Computer Security 11 3 (2003) 431-448
    • (2003) Journal of Computer Security , vol.11 , Issue.3 , pp. 431-448
    • Campbell, K.1    Gordon, L.A.2    Loeb, M.P.3    Zhou, L.4
  • 6
    • 54949137822 scopus 로고    scopus 로고
    • Campbell, P., & Stamp, J. (2004). A classification scheme for risk assessment methods. Sandia National Laboratory report SAND2004-4233, August.
    • Campbell, P., & Stamp, J. (2004). A classification scheme for risk assessment methods. Sandia National Laboratory report SAND2004-4233, August.
  • 8
    • 7444242205 scopus 로고    scopus 로고
    • The effect of internet security breach announcements on market value: Capital market reactions for breached firms and internet security developers
    • Cavusoglu H., Mishra B., and Raghunathan S. The effect of internet security breach announcements on market value: Capital market reactions for breached firms and internet security developers. International Journal of Electronic Commerce 9 1 (2004) 69-104
    • (2004) International Journal of Electronic Commerce , vol.9 , Issue.1 , pp. 69-104
    • Cavusoglu, H.1    Mishra, B.2    Raghunathan, S.3
  • 9
    • 0033299558 scopus 로고    scopus 로고
    • Simulating cyber attacks, defenses, and consequences
    • Cohen F. Simulating cyber attacks, defenses, and consequences. Computers and Security 18 6 (1999) 479-518
    • (1999) Computers and Security , vol.18 , Issue.6 , pp. 479-518
    • Cohen, F.1
  • 10
    • 54949137075 scopus 로고    scopus 로고
    • Department of Homeland Security. (2006). National Infrastructure Protection Plan: Base Plan, revised draft V2. National Infrastructure Institute. 〈http://www.ni2ciel.org/NIPC/Revised-Draft-NIPP-v2.0.pdf〉. Accessed on January 5, 2007.
    • Department of Homeland Security. (2006). National Infrastructure Protection Plan: Base Plan, revised draft V2. National Infrastructure Institute. 〈http://www.ni2ciel.org/NIPC/Revised-Draft-NIPP-v2.0.pdf〉. Accessed on January 5, 2007.
  • 12
    • 84948651069 scopus 로고    scopus 로고
    • Ettredge, M., Richardson, V. J. (2002). Assessing the risk in e-commerce. In Proceedings of the 35th Hawaii international conference on system sciences, Big Island, HI, January 7-10, 194.
    • Ettredge, M., Richardson, V. J. (2002). Assessing the risk in e-commerce. In Proceedings of the 35th Hawaii international conference on system sciences, Big Island, HI, January 7-10, 194.
  • 16
    • 21244494118 scopus 로고    scopus 로고
    • A roadmap for quantifying the efficacy of risk management of information security and interdependent SCADA systems
    • Haimes Y.Y., and Chittester C.G. A roadmap for quantifying the efficacy of risk management of information security and interdependent SCADA systems. Journal of Homeland Security and Emergency Management 2 2 (2005) 1-21
    • (2005) Journal of Homeland Security and Emergency Management , vol.2 , Issue.2 , pp. 1-21
    • Haimes, Y.Y.1    Chittester, C.G.2
  • 17
    • 0036090498 scopus 로고    scopus 로고
    • Risk filtering, ranking, and management framework using hierarchical holographic modeling
    • Haimes Y.Y., Kaplan S., and Lambert J.H. Risk filtering, ranking, and management framework using hierarchical holographic modeling. Risk Analysis 22 2 (2002) 381-395
    • (2002) Risk Analysis , vol.22 , Issue.2 , pp. 381-395
    • Haimes, Y.Y.1    Kaplan, S.2    Lambert, J.H.3
  • 19
    • 15744399767 scopus 로고    scopus 로고
    • The impact of denial-of-service attack announcements on the market value of firms
    • Hovav A., and D'Arcy J. The impact of denial-of-service attack announcements on the market value of firms. Risk Management and Insurance Review 6 2 (2003) 97-121
    • (2003) Risk Management and Insurance Review , vol.6 , Issue.2 , pp. 97-121
    • Hovav, A.1    D'Arcy, J.2
  • 20
    • 85017361394 scopus 로고    scopus 로고
    • The impact of virus attack announcements on the market value of firms
    • Hovav A., and D'Arcy J. The impact of virus attack announcements on the market value of firms. Information Systems Security 13 3 (2004) 32-40
    • (2004) Information Systems Security , vol.13 , Issue.3 , pp. 32-40
    • Hovav, A.1    D'Arcy, J.2
  • 21
    • 0042267232 scopus 로고    scopus 로고
    • More effective risk assessment
    • Iheagwara C. More effective risk assessment. Computer Security Journal 19 2 (2003) 8-20
    • (2003) Computer Security Journal , vol.19 , Issue.2 , pp. 8-20
    • Iheagwara, C.1
  • 22
    • 0034501202 scopus 로고    scopus 로고
    • Are we forgetting the risk of information technology?
    • Longstaff T., Chittister C., Pethia R., and Haimes Y. Are we forgetting the risk of information technology?. IEEE Computer 33 12 (2000) 43-51
    • (2000) IEEE Computer , vol.33 , Issue.12 , pp. 43-51
    • Longstaff, T.1    Chittister, C.2    Pethia, R.3    Haimes, Y.4
  • 24
    • 34548048602 scopus 로고    scopus 로고
    • Risk assessment: The first step
    • Miller D., and Byres E. Risk assessment: The first step. InTech 52 3 (2005) 68-69
    • (2005) InTech , vol.52 , Issue.3 , pp. 68-69
    • Miller, D.1    Byres, E.2
  • 26
    • 54949088022 scopus 로고    scopus 로고
    • Patel, S. (2006). Secure internet-based communication protocol for SCADA networks. Ph.D. dissertation, University of Louisville, Louisville, Kentucky.
    • Patel, S. (2006). Secure internet-based communication protocol for SCADA networks. Ph.D. dissertation, University of Louisville, Louisville, Kentucky.
  • 30
    • 54949151233 scopus 로고    scopus 로고
    • Pumfrey, D. J. (1999). The principled design of computer system safety analyses. D. Phil. thesis, University of York, UK.
    • Pumfrey, D. J. (1999). The principled design of computer system safety analyses. D. Phil. thesis, University of York, UK.
  • 31
    • 54949099386 scopus 로고    scopus 로고
    • Rakaczky, E. (2005). Building a security business case. Process control systems forum, October 25-27, Chicago, Illinois, 〈www.pcsforum.org/events/2005/fall/pdf/Building%20a%20Security%20Business%20Case2a.pdf〉. Accessed on January 5, 2007.
    • Rakaczky, E. (2005). Building a security business case. Process control systems forum, October 25-27, Chicago, Illinois, 〈www.pcsforum.org/events/2005/fall/pdf/Building%20a%20Security%20Business%20Case2a.pdf〉. Accessed on January 5, 2007.
  • 33
    • 12344298391 scopus 로고    scopus 로고
    • Rinaldi, S. M. (2004). Modeling and simulating critical infrastructures and their interdependencies. In: Proceedings of the 37th Hawaii international conference on system sciences, January 05-08, Big Island, HI, pp. 1-8.
    • Rinaldi, S. M. (2004). Modeling and simulating critical infrastructures and their interdependencies. In: Proceedings of the 37th Hawaii international conference on system sciences, January 05-08, Big Island, HI, pp. 1-8.
  • 35
    • 33748075456 scopus 로고    scopus 로고
    • Toward a unified security/safety model
    • Stoneburner G. Toward a unified security/safety model. Computer 39 8 (2006) 96-97
    • (2006) Computer , vol.39 , Issue.8 , pp. 96-97
    • Stoneburner, G.1
  • 38
    • 84948954303 scopus 로고    scopus 로고
    • Yasinsac, A., Childs, J. (2001). Analyzing internet security protocols. In Proceedings of the sixth international conference on high assurance systems, Boca Raton, FL, October 2001, pp. 149-159.
    • Yasinsac, A., Childs, J. (2001). Analyzing internet security protocols. In Proceedings of the sixth international conference on high assurance systems, Boca Raton, FL, October 2001, pp. 149-159.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.