Quantitative Model in Security Informatics Risk Assessment

This paper shows the importance of approaching in security Risk Assessment (RA) about Quantitative model in Risk Management. The RA has been calculated with qualitative method by different framework, for example: RISK IT FRAMEWORK (COBIT Component) [7], OCTAVE – ALLEGRO [8], MAGERIT V3 [9], FAIR [4]...

Full description

Autores:
Tipo de recurso:
Article of journal
Fecha de publicación:
2016
Institución:
Universidad Antonio Nariño
Repositorio:
Repositorio UAN
Idioma:
spa
OAI Identifier:
oai:repositorio.uan.edu.co:123456789/10477
Acceso en línea:
https://revistas.uan.edu.co/index.php/ingeuan/article/view/414
https://repositorio.uan.edu.co/handle/123456789/10477
Palabra clave:
Análisis Forense Logs
Seguridad informática
Evaluación de riesgos
Regresión logística
Diagramas de influencias
Risk Assessment
Information security
logistic regression statistics model
influence diagrams
IDS
Network forensic
Rights
License
https://creativecommons.org/licenses/by-nc-sa/4.0
id UAntonioN2_865ffe94471b4cffd806e43bb482716b
oai_identifier_str oai:repositorio.uan.edu.co:123456789/10477
network_acronym_str UAntonioN2
network_name_str Repositorio UAN
repository_id_str
spelling 2016-02-242024-10-10T02:25:41Z2024-10-10T02:25:41Zhttps://revistas.uan.edu.co/index.php/ingeuan/article/view/414https://repositorio.uan.edu.co/handle/123456789/10477This paper shows the importance of approaching in security Risk Assessment (RA) about Quantitative model in Risk Management. The RA has been calculated with qualitative method by different framework, for example: RISK IT FRAMEWORK (COBIT Component) [7], OCTAVE – ALLEGRO [8], MAGERIT V3 [9], FAIR [4], ISO 27005 [11], NIST800-30 [3]. All frameworks included in the scope the Risk Assessment; however this is more qualitative than quantitative. In this work, we propose a methodology to support the implementation and execution risk management, using quantitative risk assessment method. The methodology is based on three components: secure capture logs (apply networks forensic technical), likelihood risk or log analysis with logistic regression and risk assessment with influence diagrams.El artículo presenta el desarrollo de un proyecto orientado hacia la evaluación de un modelado que permita a los profesionales en seguridad informática, fundamentar la evaluación de riesgos de seguridad sobre bases de estimación cuantitativas, soportándose para ello en herramientas tales como: Regresión logística, Diagramas de Influencia y Network Forensic, que permitan capturar datos de volúmenes de transacciones (archivos tipo LOG), garantizando su integridad y seguridad de dicha información, con el fin de  llegar a cálculos de probabilidad numérica, sobre escenarios de riesgo detectados en los logs transaccionales y en las trazas que dejan los registros en un IDS SNORT.application/pdfspaUNIVERSIDAD ANTONIO NARIÑOhttps://revistas.uan.edu.co/index.php/ingeuan/article/view/414/349https://creativecommons.org/licenses/by-nc-sa/4.0http://purl.org/coar/access_right/c_abf2INGE@UAN - TENDENCIAS EN LA INGENIERÍA; Vol. 6 Núm. 11 (2015)2346-14462145-0935Análisis Forense LogsSeguridad informáticaEvaluación de riesgosRegresión logísticaDiagramas de influenciasRisk AssessmentInformation securitylogistic regression statistics modelinfluence diagramsIDSNetwork forensicQuantitative Model in Security Informatics Risk AssessmentModelo de Evaluación Cuantitativa de Riesgos en Seguridad Informáticainfo:eu-repo/semantics/articleinfo:eu-repo/semantics/publishedVersionhttp://purl.org/coar/resource_type/c_6501http://purl.org/coar/resource_type/c_2df8fbb1http://purl.org/coar/version/c_970fb48d4fbd8a85Casanova, Andrés123456789/10477oai:repositorio.uan.edu.co:123456789/104772024-10-14 03:48:15.695metadata.onlyhttps://repositorio.uan.edu.coRepositorio Institucional UANalertas.repositorio@uan.edu.co
dc.title.en-US.fl_str_mv Quantitative Model in Security Informatics Risk Assessment
dc.title.es-ES.fl_str_mv Modelo de Evaluación Cuantitativa de Riesgos en Seguridad Informática
title Quantitative Model in Security Informatics Risk Assessment
spellingShingle Quantitative Model in Security Informatics Risk Assessment
Análisis Forense Logs
Seguridad informática
Evaluación de riesgos
Regresión logística
Diagramas de influencias
Risk Assessment
Information security
logistic regression statistics model
influence diagrams
IDS
Network forensic
title_short Quantitative Model in Security Informatics Risk Assessment
title_full Quantitative Model in Security Informatics Risk Assessment
title_fullStr Quantitative Model in Security Informatics Risk Assessment
title_full_unstemmed Quantitative Model in Security Informatics Risk Assessment
title_sort Quantitative Model in Security Informatics Risk Assessment
dc.subject.es-ES.fl_str_mv Análisis Forense Logs
Seguridad informática
Evaluación de riesgos
Regresión logística
Diagramas de influencias
topic Análisis Forense Logs
Seguridad informática
Evaluación de riesgos
Regresión logística
Diagramas de influencias
Risk Assessment
Information security
logistic regression statistics model
influence diagrams
IDS
Network forensic
dc.subject.en-US.fl_str_mv Risk Assessment
Information security
logistic regression statistics model
influence diagrams
IDS
Network forensic
description This paper shows the importance of approaching in security Risk Assessment (RA) about Quantitative model in Risk Management. The RA has been calculated with qualitative method by different framework, for example: RISK IT FRAMEWORK (COBIT Component) [7], OCTAVE – ALLEGRO [8], MAGERIT V3 [9], FAIR [4], ISO 27005 [11], NIST800-30 [3]. All frameworks included in the scope the Risk Assessment; however this is more qualitative than quantitative. In this work, we propose a methodology to support the implementation and execution risk management, using quantitative risk assessment method. The methodology is based on three components: secure capture logs (apply networks forensic technical), likelihood risk or log analysis with logistic regression and risk assessment with influence diagrams.
publishDate 2016
dc.date.accessioned.none.fl_str_mv 2024-10-10T02:25:41Z
dc.date.available.none.fl_str_mv 2024-10-10T02:25:41Z
dc.date.none.fl_str_mv 2016-02-24
dc.type.none.fl_str_mv info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
dc.type.coar.fl_str_mv http://purl.org/coar/resource_type/c_2df8fbb1
dc.type.coar.spa.fl_str_mv http://purl.org/coar/resource_type/c_6501
dc.type.coarversion.none.fl_str_mv http://purl.org/coar/version/c_970fb48d4fbd8a85
format http://purl.org/coar/resource_type/c_6501
status_str publishedVersion
dc.identifier.none.fl_str_mv https://revistas.uan.edu.co/index.php/ingeuan/article/view/414
dc.identifier.uri.none.fl_str_mv https://repositorio.uan.edu.co/handle/123456789/10477
url https://revistas.uan.edu.co/index.php/ingeuan/article/view/414
https://repositorio.uan.edu.co/handle/123456789/10477
dc.language.none.fl_str_mv spa
language spa
dc.relation.none.fl_str_mv https://revistas.uan.edu.co/index.php/ingeuan/article/view/414/349
dc.rights.es-ES.fl_str_mv https://creativecommons.org/licenses/by-nc-sa/4.0
dc.rights.coar.spa.fl_str_mv http://purl.org/coar/access_right/c_abf2
rights_invalid_str_mv https://creativecommons.org/licenses/by-nc-sa/4.0
http://purl.org/coar/access_right/c_abf2
dc.format.none.fl_str_mv application/pdf
dc.publisher.es-ES.fl_str_mv UNIVERSIDAD ANTONIO NARIÑO
dc.source.es-ES.fl_str_mv INGE@UAN - TENDENCIAS EN LA INGENIERÍA; Vol. 6 Núm. 11 (2015)
dc.source.none.fl_str_mv 2346-1446
2145-0935
institution Universidad Antonio Nariño
repository.name.fl_str_mv Repositorio Institucional UAN
repository.mail.fl_str_mv alertas.repositorio@uan.edu.co
_version_ 1814300331414126592