Quantitative Model in Security Informatics Risk Assessment
This paper shows the importance of approaching in security Risk Assessment (RA) about Quantitative model in Risk Management. The RA has been calculated with qualitative method by different framework, for example: RISK IT FRAMEWORK (COBIT Component) [7], OCTAVE – ALLEGRO [8], MAGERIT V3 [9], FAIR [4]...
- Autores:
- Tipo de recurso:
- Article of journal
- Fecha de publicación:
- 2016
- Institución:
- Universidad Antonio Nariño
- Repositorio:
- Repositorio UAN
- Idioma:
- spa
- OAI Identifier:
- oai:repositorio.uan.edu.co:123456789/10477
- Acceso en línea:
- https://revistas.uan.edu.co/index.php/ingeuan/article/view/414
https://repositorio.uan.edu.co/handle/123456789/10477
- Palabra clave:
- Análisis Forense Logs
Seguridad informática
Evaluación de riesgos
Regresión logística
Diagramas de influencias
Risk Assessment
Information security
logistic regression statistics model
influence diagrams
IDS
Network forensic
- Rights
- License
- https://creativecommons.org/licenses/by-nc-sa/4.0
id |
UAntonioN2_865ffe94471b4cffd806e43bb482716b |
---|---|
oai_identifier_str |
oai:repositorio.uan.edu.co:123456789/10477 |
network_acronym_str |
UAntonioN2 |
network_name_str |
Repositorio UAN |
repository_id_str |
|
spelling |
2016-02-242024-10-10T02:25:41Z2024-10-10T02:25:41Zhttps://revistas.uan.edu.co/index.php/ingeuan/article/view/414https://repositorio.uan.edu.co/handle/123456789/10477This paper shows the importance of approaching in security Risk Assessment (RA) about Quantitative model in Risk Management. The RA has been calculated with qualitative method by different framework, for example: RISK IT FRAMEWORK (COBIT Component) [7], OCTAVE – ALLEGRO [8], MAGERIT V3 [9], FAIR [4], ISO 27005 [11], NIST800-30 [3]. All frameworks included in the scope the Risk Assessment; however this is more qualitative than quantitative. In this work, we propose a methodology to support the implementation and execution risk management, using quantitative risk assessment method. The methodology is based on three components: secure capture logs (apply networks forensic technical), likelihood risk or log analysis with logistic regression and risk assessment with influence diagrams.El artículo presenta el desarrollo de un proyecto orientado hacia la evaluación de un modelado que permita a los profesionales en seguridad informática, fundamentar la evaluación de riesgos de seguridad sobre bases de estimación cuantitativas, soportándose para ello en herramientas tales como: Regresión logística, Diagramas de Influencia y Network Forensic, que permitan capturar datos de volúmenes de transacciones (archivos tipo LOG), garantizando su integridad y seguridad de dicha información, con el fin de llegar a cálculos de probabilidad numérica, sobre escenarios de riesgo detectados en los logs transaccionales y en las trazas que dejan los registros en un IDS SNORT.application/pdfspaUNIVERSIDAD ANTONIO NARIÑOhttps://revistas.uan.edu.co/index.php/ingeuan/article/view/414/349https://creativecommons.org/licenses/by-nc-sa/4.0http://purl.org/coar/access_right/c_abf2INGE@UAN - TENDENCIAS EN LA INGENIERÍA; Vol. 6 Núm. 11 (2015)2346-14462145-0935Análisis Forense LogsSeguridad informáticaEvaluación de riesgosRegresión logísticaDiagramas de influenciasRisk AssessmentInformation securitylogistic regression statistics modelinfluence diagramsIDSNetwork forensicQuantitative Model in Security Informatics Risk AssessmentModelo de Evaluación Cuantitativa de Riesgos en Seguridad Informáticainfo:eu-repo/semantics/articleinfo:eu-repo/semantics/publishedVersionhttp://purl.org/coar/resource_type/c_6501http://purl.org/coar/resource_type/c_2df8fbb1http://purl.org/coar/version/c_970fb48d4fbd8a85Casanova, Andrés123456789/10477oai:repositorio.uan.edu.co:123456789/104772024-10-14 03:48:15.695metadata.onlyhttps://repositorio.uan.edu.coRepositorio Institucional UANalertas.repositorio@uan.edu.co |
dc.title.en-US.fl_str_mv |
Quantitative Model in Security Informatics Risk Assessment |
dc.title.es-ES.fl_str_mv |
Modelo de Evaluación Cuantitativa de Riesgos en Seguridad Informática |
title |
Quantitative Model in Security Informatics Risk Assessment |
spellingShingle |
Quantitative Model in Security Informatics Risk Assessment Análisis Forense Logs Seguridad informática Evaluación de riesgos Regresión logística Diagramas de influencias Risk Assessment Information security logistic regression statistics model influence diagrams IDS Network forensic |
title_short |
Quantitative Model in Security Informatics Risk Assessment |
title_full |
Quantitative Model in Security Informatics Risk Assessment |
title_fullStr |
Quantitative Model in Security Informatics Risk Assessment |
title_full_unstemmed |
Quantitative Model in Security Informatics Risk Assessment |
title_sort |
Quantitative Model in Security Informatics Risk Assessment |
dc.subject.es-ES.fl_str_mv |
Análisis Forense Logs Seguridad informática Evaluación de riesgos Regresión logística Diagramas de influencias |
topic |
Análisis Forense Logs Seguridad informática Evaluación de riesgos Regresión logística Diagramas de influencias Risk Assessment Information security logistic regression statistics model influence diagrams IDS Network forensic |
dc.subject.en-US.fl_str_mv |
Risk Assessment Information security logistic regression statistics model influence diagrams IDS Network forensic |
description |
This paper shows the importance of approaching in security Risk Assessment (RA) about Quantitative model in Risk Management. The RA has been calculated with qualitative method by different framework, for example: RISK IT FRAMEWORK (COBIT Component) [7], OCTAVE – ALLEGRO [8], MAGERIT V3 [9], FAIR [4], ISO 27005 [11], NIST800-30 [3]. All frameworks included in the scope the Risk Assessment; however this is more qualitative than quantitative. In this work, we propose a methodology to support the implementation and execution risk management, using quantitative risk assessment method. The methodology is based on three components: secure capture logs (apply networks forensic technical), likelihood risk or log analysis with logistic regression and risk assessment with influence diagrams. |
publishDate |
2016 |
dc.date.accessioned.none.fl_str_mv |
2024-10-10T02:25:41Z |
dc.date.available.none.fl_str_mv |
2024-10-10T02:25:41Z |
dc.date.none.fl_str_mv |
2016-02-24 |
dc.type.none.fl_str_mv |
info:eu-repo/semantics/article info:eu-repo/semantics/publishedVersion |
dc.type.coar.fl_str_mv |
http://purl.org/coar/resource_type/c_2df8fbb1 |
dc.type.coar.spa.fl_str_mv |
http://purl.org/coar/resource_type/c_6501 |
dc.type.coarversion.none.fl_str_mv |
http://purl.org/coar/version/c_970fb48d4fbd8a85 |
format |
http://purl.org/coar/resource_type/c_6501 |
status_str |
publishedVersion |
dc.identifier.none.fl_str_mv |
https://revistas.uan.edu.co/index.php/ingeuan/article/view/414 |
dc.identifier.uri.none.fl_str_mv |
https://repositorio.uan.edu.co/handle/123456789/10477 |
url |
https://revistas.uan.edu.co/index.php/ingeuan/article/view/414 https://repositorio.uan.edu.co/handle/123456789/10477 |
dc.language.none.fl_str_mv |
spa |
language |
spa |
dc.relation.none.fl_str_mv |
https://revistas.uan.edu.co/index.php/ingeuan/article/view/414/349 |
dc.rights.es-ES.fl_str_mv |
https://creativecommons.org/licenses/by-nc-sa/4.0 |
dc.rights.coar.spa.fl_str_mv |
http://purl.org/coar/access_right/c_abf2 |
rights_invalid_str_mv |
https://creativecommons.org/licenses/by-nc-sa/4.0 http://purl.org/coar/access_right/c_abf2 |
dc.format.none.fl_str_mv |
application/pdf |
dc.publisher.es-ES.fl_str_mv |
UNIVERSIDAD ANTONIO NARIÑO |
dc.source.es-ES.fl_str_mv |
INGE@UAN - TENDENCIAS EN LA INGENIERÍA; Vol. 6 Núm. 11 (2015) |
dc.source.none.fl_str_mv |
2346-1446 2145-0935 |
institution |
Universidad Antonio Nariño |
repository.name.fl_str_mv |
Repositorio Institucional UAN |
repository.mail.fl_str_mv |
alertas.repositorio@uan.edu.co |
_version_ |
1814300331414126592 |