DocumentCode :
3088980
Title :
Managing evolving security situations
Author :
Kivimaa, Jyri ; Ojamaa, Andres ; Tyugu, Enn
Author_Institution :
Centre of Excellence, Cooperative Cyber Defence, Tallinn, Estonia
fYear :
2009
fDate :
18-21 Oct. 2009
Firstpage :
1
Lastpage :
7
Abstract :
A method is described that takes into account the investments done in the security and/or achieved security confidence in planning new security measures. The method uses new integral security metrics and the well-known graded security model. A precondition for the application of this method is the availability of expert knowledge or statistical data for the model in use that describes a class of situations where the analyzed security situation belongs to. For a number of situations at present, this information has been extracted from standards of graded security. For specific military communications applications the data must be collected from a log analysis of characteristic attacks and security reports, as well as by the traditional knowledge acquisition means.
Keywords :
knowledge acquisition; military computing; security of data; characteristic attack log analysis; data log analysis; graded security standards; integral security metrics; knowledge acquisition; military communications applications; security confidence; security measures; security reports; security situation management; statistical data model; Computer security; Cost function; Cybernetics; Data security; Information security; Investments; Optimization methods; Paper technology; Technology management; Technology planning;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Military Communications Conference, 2009. MILCOM 2009. IEEE
Conference_Location :
Boston, MA
Print_ISBN :
978-1-4244-5238-5
Electronic_ISBN :
978-1-4244-5239-2
Type :
conf
DOI :
10.1109/MILCOM.2009.5380110
Filename :
5380110
Link To Document :
بازگشت