Vis enkel innførsel

dc.contributor.authorWangen, Gaute
dc.contributor.authorHellesen, Niclas
dc.contributor.authorTorres, Henrik
dc.contributor.authorBrækken, Erlend
dc.date.accessioned2018-02-12T11:41:06Z
dc.date.available2018-02-12T11:41:06Z
dc.date.created2017-09-15T12:07:10Z
dc.date.issued2017
dc.identifier.isbn978-1-61208-582-1
dc.identifier.urihttp://hdl.handle.net/11250/2484055
dc.description.abstractThis paper studies the application of Root-cause analysis (RCA) methodology to a complex socio-technical information security (InfoSec) management problem. InfoSec risk assessment (ISRA) is the common approach for dealing with problems is InfoSec, where the main purpose is to manage risk and maintain an acceptable risk level. In comparison, the RCA tools are designed to identify and eliminate the root-cause of a reoccurring problem. Our case study is a complex issue regarding multiple breaches of the security policy primarily through access control violations. By running a full-scale RCA, this study finds that the benefits of the RCA tools are a better understanding of the social aspects of the risk; RCA highlighted previously unknown social and administrative causes for the problem which in turn provided an improved decision-basis. The problem treatments recommended by the ISRA and the RCA differed in that the ISRA results recommended technical controls, while the RCA suggested more administrative treatments. Furthermore, we found that the ISRA and RCA can complement each other in administrative and technical issues. The main drawback was that our cost-benefit analysis regarding hours spent on RCA was on the borderline of being justifiable. As future work, we propose to develop a leaner version of the RCA scoped for information security problems.nb_NO
dc.language.isoengnb_NO
dc.publisherInternational Academy, Research and Industry Association (IARIA)nb_NO
dc.relation.ispartofSECURWARE 2017 - The Eleventh International Conference on Emerging Security Information, Systems and Technologies
dc.titleAn Empirical Study of Root-Cause Analysis in Information Security Managementnb_NO
dc.typeChapternb_NO
dc.description.versionacceptedVersionnb_NO
dc.source.pagenumber26-33nb_NO
dc.identifier.cristin1494068
dc.description.localcodeThis chapter will not be available due to copyright restrictions (c) 2017 by International Academy, Research and Industry Association (IARIA)nb_NO
cristin.unitcode194,18,21,80
cristin.unitnameNorwegian Information Security Lab
cristin.ispublishedtrue
cristin.fulltextpostprint
cristin.qualitycode1


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel