Vis enkel innførsel

dc.contributor.advisorSnekkenes, Einar
dc.contributor.advisorKowalski, Stewart
dc.contributor.authorWangen, Gaute Bjørklund
dc.date.accessioned2017-06-28T12:40:28Z
dc.date.available2017-06-28T12:40:28Z
dc.date.issued2017
dc.identifier.isbn978-82-326-2379-2
dc.identifier.issn1503-8181
dc.identifier.urihttp://hdl.handle.net/11250/2447264
dc.description.abstractWe conduct risk assessments to reducing the uncertainty regarding future events in order to make the best decisions possible and to control risk. In industry, the aim is to find the appropriate balance in risk-taking relative to the organization’s risk appetite and tolerance. Too many security controls will inhibit business functionality, and the opposite will lead to unacceptable exposure. The complexity in the information and cyber security domain increases on a daily basis, which makes identifying, analyzing, and controlling the relevant risk events a major challenge. Thus, this thesis addresses several aspects of Cyber and Information Security Risk Assessment (ISRA) and Management (ISRM) Practices and contributes to novel research problems, methods, models, and knowledge within the discipline. This thesis applies the Design Science Research framework to investigate the theoretical and practical issues in ISRA. The challenges within the ISRM field are many, and scholars, researchers, and practitioners have known about several of them throughout many years. With over hundred ISRA methods to choose from, multiple theoretical comparative studies of these methods, the literature on the topic of issues in ISRM was quite dispersed. To address this problem, this thesis applies literature review and structures the known research problems into a taxonomy. The findings from the initial literature survey were mainly theoretical, which made their practical relevance and implications uncertain. For a variety of reasons, one of the fundamental problems in information security is conducting empirical research. For validating and expanding the initial findings, this work reached industry practitioners through an online questionnaire. The study found that the main ISRM issues for the practitioners regarded risk communication, security measurements, and return on investments. While for risk assessment and analysis, we found the key issues to be the application of quantitative and qualitative methods, need for expertise, and asset evaluation. Furthermore, empirical studies of method use are necessary to derive cause and effect between method choice, tasks, and results, and to figure out what works in ISRA. There exists multiple comparative assessments of ISRM/RA methods which are primarily scoped to compare method content to a predetermined set of criteria. Although the findings from applying these approaches are useful in understanding ISRA practices, they leave out the tasks and activities not present in the criteria and were not helpful in establishing cause and effect. To address this issue, we propose the Core Unified Risk Framework (CURF) as a bottom-up approach to ISRA method comparison and to measure completeness. By applying CURF, we found ISO/IEC 27005 Information Security Risk Management to be the most complete approach at present, with the Factor Analysis of Information Risk (FAIR) as the most complete risk estimation method. Also, we also discovered several gaps in the surveyed methods. Moreover, we ran an experiment where we applied three different ISRA methods on four large-scale case studies. By using CURF in a novel way, it enabled us to do metadata analysis of ISRA reports and establish cause-effect between ISRA method choice and result. Our study found that the method selection influences the assessment process, along with its outcome. Finally, one of the foremost discussed research problems in ISRM is the application of qualitative and quantitative methods. In short, the critique of the approaches is: (i) Quantitative ISRA is mostly conducted using previous cases and historical data. Depending on statistical data alone for risk assessments will be too naive as the data quickly becomes obsolete, lack of data, and is limited to only previously observed events, while the Qualitative ISRA is prone to several human biases. However, ISRM methods claim to be mainly quantitative or qualitative, but the quantitative versus qualitative risk situation is not strictly either-or. There are degrees of subjectivity and human-made assumptions in any risk assessment, and this work explores the intersection of these two approaches. Firstly, we analyzed the limitations of quantitative ISRA forecasting through a novel application of Taleb’s Four Quadrants Risk Classification scheme. Using the findings from the prior CURF studies combined with the risk classification scheme, we construct a state of the art model for risk assessing a DDoS attack (Distributed Denial of service). The risk model consists of distinct classes and estimators gathered from CURF, where the novelty lies in the combination both the quantitative (statistics) and qualitative (subjective knowledge-based) aspects to model the attack and estimate the risk. The approach centers on qualitative estimations of assets, vulnerabilities, threats, controls, and associated outcomes, together with a statistical analysis of the risk. Our main contribution is the process to combine the qualitative and quantitative estimation methods for cyber security risks, together with an insight into which technical details and variables to consider when risk assessing the DDoS amplification attack.nb_NO
dc.language.isoengnb_NO
dc.publisherNTNUnb_NO
dc.relation.ispartofseriesDoctoral theses at NTNU;2017:153
dc.relation.haspartPaper 1: Wangen, Gaute; Snekkenes, Einar. A Taxonomy of Challenges in Information Security Risk Management. I: Proceeding of Norwegian Information Security Conference / Norsk informasjonssikkerhetskonferanse - NISK 2013
dc.relation.haspartPaper 2: Wangen, Gaute; Snekkenes, Einar. A Comparison between Business Process Management and Information Security Management. I: Proceedings of the 2014 Federated Conference on Computer Science and Information Systems. IEEE conference proceedings http://dx.doi.org/10.15439/2014F77 © 2014 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works
dc.relation.haspartPaper 3: Wangen, Gaute. An Initial Insight Into InfoSec Risk Management Practices. Norsk Informasjonssikkerhetskonferanse (NISK) 2015 Suppl. 12
dc.relation.haspartPaper 4: Wangen, Gaute. An initial insight into Information Security Risk Assessment practices. I: Annals of Computer Science and Information Systems, Volume 8 Proceedings of the 2016 Federated Conference on Computer Science and Information Systems. IEEE conference proceedings 2016 . s. 999-1008 http://dx.doi.org/10.15439/2016F158 © 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works
dc.relation.haspartPaper 5: Wangen, Gaute; Hallstensen,Christoffer; Snekkenes, Einar. Framework for estimating information security risk assessment method completeness - Core Unified Risk Framework. http://dx.doi.org/10.1007/s10207-017-0382-0 © The Author(s) 2017. This article is an open access publication
dc.relation.haspartPaper 6: Wangen, Gaute. Information Security Risk Assessment: A Method Comparison. Computer 2017 ;Volum 4.(50) s. 52-61 http://dx.doi.org/10.1109/MC.2017.107 © 2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works
dc.relation.haspartPaper 7: Wangen, Gaute; Shalaginov, Andrii. Quantitative Risk, Statistical Methods and the Four Quadrants for Information Security. I: Risks and Security of Internet and Systems: 10th International Conference, CRiSIS 2015. The final publication is available at http://dx.doi.org/10.1007/978-3-319-31811-0_8
dc.relation.haspartPaper 8: Wangen, Gaute; Shalaginov, Andrii; Hallstensen, Christoffer V. Cyber security risk assessment of a DDoS attack. Lecture Notes in Computer Science 2016 ;Volum 9866. s. 183-202. The final publication is available at http://dx.doi.org/10.1007/978-3-319-45871-7_12
dc.titleCyber Security Risk Assessment Practices: Core Unified Risk Frameworknb_NO
dc.typeDoctoral thesisnb_NO
dc.subject.nsiVDP::Technology: 500::Information and communication technology: 550::Computer technology: 551nb_NO


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel