• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

多准则决策框架在网络安全风险评估与管理中的应用。

Multicriteria Decision Framework for Cybersecurity Risk Assessment and Management.

机构信息

University of Virginia, Department of Systems and Information Engineering, Charlottesville, VA, USA.

U.S. Army Engineer Research & Development Center, Contractor, Concord, MA, USA.

出版信息

Risk Anal. 2020 Jan;40(1):183-199. doi: 10.1111/risa.12891. Epub 2017 Sep 5.

DOI:10.1111/risa.12891
PMID:28873246
Abstract

Risk assessors and managers face many difficult challenges related to novel cyber systems. Among these challenges are the constantly changing nature of cyber systems caused by technical advances, their distribution across the physical, information, and sociocognitive domains, and the complex network structures often including thousands of nodes. Here, we review probabilistic and risk-based decision-making techniques applied to cyber systems and conclude that existing approaches typically do not address all components of the risk assessment triplet (threat, vulnerability, consequence) and lack the ability to integrate across multiple domains of cyber systems to provide guidance for enhancing cybersecurity. We present a decision-analysis-based approach that quantifies threat, vulnerability, and consequences through a set of criteria designed to assess the overall utility of cybersecurity management alternatives. The proposed framework bridges the gap between risk assessment and risk management, allowing an analyst to ensure a structured and transparent process of selecting risk management alternatives. The use of this technique is illustrated for a hypothetical, but realistic, case study exemplifying the process of evaluating and ranking five cybersecurity enhancement strategies. The approach presented does not necessarily eliminate biases and subjectivity necessary for selecting countermeasures, but provides justifiable methods for selecting risk management actions consistent with stakeholder and decisionmaker values and technical data.

摘要

风险评估人员和管理人员在面对新型网络系统时面临着许多困难的挑战。这些挑战包括技术进步导致的网络系统的不断变化的性质、它们在物理、信息和社会认知领域的分布,以及通常包括数千个节点的复杂网络结构。在这里,我们回顾了应用于网络系统的概率和基于风险的决策技术,并得出结论,现有方法通常不能解决风险评估三元组(威胁、脆弱性、后果)的所有组成部分,并且缺乏跨网络系统的多个领域进行集成的能力,无法为增强网络安全提供指导。我们提出了一种基于决策分析的方法,通过一组旨在评估网络安全管理替代方案总体效用的标准来量化威胁、脆弱性和后果。所提出的框架弥合了风险评估和风险管理之间的差距,允许分析师确保选择风险管理替代方案的结构化和透明过程。该技术的使用通过一个假设但现实的案例研究来说明,该案例研究说明了评估和排名五种网络安全增强策略的过程。所提出的方法不一定消除选择对策所需的偏见和主观性,但提供了合理的方法来选择与利益相关者和决策者的价值观和技术数据一致的风险管理行动。

相似文献

1
Multicriteria Decision Framework for Cybersecurity Risk Assessment and Management.多准则决策框架在网络安全风险评估与管理中的应用。
Risk Anal. 2020 Jan;40(1):183-199. doi: 10.1111/risa.12891. Epub 2017 Sep 5.
2
Use of multicriteria decision analysis to support weight of evidence evaluation.运用多准则决策分析支持证据权重评估。
Risk Anal. 2011 Aug;31(8):1211-25. doi: 10.1111/j.1539-6924.2011.01585.x. Epub 2011 Mar 3.
3
Cyber Hygiene Methodology for Raising Cybersecurity and Data Privacy Awareness in Health Care Organizations: Concept Study.网络卫生方法在提高医疗机构网络安全和数据隐私意识中的应用:概念研究。
J Med Internet Res. 2023 Jul 27;25:e41294. doi: 10.2196/41294.
4
Characterizing and Measuring Maliciousness for Cybersecurity Risk Assessment.用于网络安全风险评估的恶意性特征描述与度量
Front Psychol. 2018 Feb 5;9:39. doi: 10.3389/fpsyg.2018.00039. eCollection 2018.
5
Cyber Risk Propagation and Optimal Selection of Cybersecurity Controls for Complex Cyberphysical Systems.网络风险传播与复杂网络物理系统的网络安全控制的最优选择
Sensors (Basel). 2021 Mar 1;21(5):1691. doi: 10.3390/s21051691.
6
Applying Reinforcement Learning for Enhanced Cybersecurity against Adversarial Simulation.应用强化学习增强对抗性模拟的网络安全防御
Sensors (Basel). 2023 Mar 10;23(6):3000. doi: 10.3390/s23063000.
7
Cyber-attacks in the next-generation cars, mitigation techniques, anticipated readiness and future directions.下一代汽车中的网络攻击、缓解技术、预期就绪情况和未来方向。
Accid Anal Prev. 2020 Dec;148:105837. doi: 10.1016/j.aap.2020.105837. Epub 2020 Oct 26.
8
Maybe If We Turn It Off and Then Turn It Back On Again? Exploring Health Care Reform as a Means to Curb Cyber Attacks.也许我们可以关闭它,然后再重新打开它?探索医疗改革以遏制网络攻击。
J Law Med Ethics. 2019 Dec;47(4_suppl):91-102. doi: 10.1177/1073110519898046.
9
Selection of remedial alternatives for mine sites: a multicriteria decision analysis approach.矿山补救方案选择:一种多准则决策分析方法。
J Environ Manage. 2013 Apr 15;119:36-46. doi: 10.1016/j.jenvman.2013.01.024. Epub 2013 Feb 26.
10
A conceptual system dynamics model for cybersecurity assessment of connected and autonomous vehicles.面向车联网和自动驾驶汽车网络安全评估的概念系统动力学模型。
Accid Anal Prev. 2022 Feb;165:106515. doi: 10.1016/j.aap.2021.106515. Epub 2021 Dec 8.

引用本文的文献

1
Maintenance Performance in the Age of Industry 4.0: A Bibliometric Performance Analysis and a Systematic Literature Review.工业 4.0 时代的维护绩效:文献计量绩效分析与系统文献综述。
Sensors (Basel). 2023 Jan 27;23(3):1409. doi: 10.3390/s23031409.
2
Advancing the cybersecurity of the healthcare system with self-optimising and self-adaptative artificial intelligence (part 2).利用自我优化和自适应人工智能提升医疗系统的网络安全(第二部分)
Health Technol (Berl). 2022;12(5):923-929. doi: 10.1007/s12553-022-00691-6. Epub 2022 Aug 12.
3
Developing and evaluating cybersecurity competencies for students in computing programs.
为计算机专业的学生培养和评估网络安全能力。
PeerJ Comput Sci. 2022 Jan 17;8:e827. doi: 10.7717/peerj-cs.827. eCollection 2022.
4
The Role of the Digital Economy in Rebuilding and Maintaining Social Governance Mechanisms.数字经济在重建和维护社会治理机制中的作用。
Front Public Health. 2022 Jan 14;9:819727. doi: 10.3389/fpubh.2021.819727. eCollection 2021.
5
Automated Cyber and Privacy Risk Management Toolkit.自动化网络和隐私风险管理工具包。
Sensors (Basel). 2021 Aug 15;21(16):5493. doi: 10.3390/s21165493.
6
Dynamic real-time risk analytics of uncontrollable states in complex internet of things systems: cyber risk at the edge.复杂物联网系统中不可控状态的动态实时风险分析:边缘网络风险
Environ Syst Decis. 2021;41(2):236-247. doi: 10.1007/s10669-020-09792-x. Epub 2020 Nov 22.
7
Prioritization of Information Security Controls through Fuzzy AHP for Cloud Computing Networks and Wireless Sensor Networks.通过模糊层次分析法对云计算网络和无线传感器网络的信息安全控制进行优先级排序。
Sensors (Basel). 2020 Feb 28;20(5):1310. doi: 10.3390/s20051310.
8
Who Should Pay for Interdependent Risk? Policy Implications for Security Interdependence Among Airports.谁应为相互依存的风险买单?机场间安保相互依存的政策影响。
Risk Anal. 2020 May;40(5):1001-1019. doi: 10.1111/risa.13454. Epub 2020 Feb 22.
9
Stochastic Counterfactual Risk Analysis for the Vulnerability Assessment of Cyber-Physical Attacks on Electricity Distribution Infrastructure Networks.基于随机反事实风险分析的电网基础设施网络中电力线通信网络脆弱性评估
Risk Anal. 2019 Sep;39(9):2012-2031. doi: 10.1111/risa.13291. Epub 2019 Feb 27.