Title :
CIAM: A data-driven approach for selecting and prioritizing security controls
Author_Institution :
Johns Hopkins Univ. Appl. Phys. Lab., Laurel, MD, USA
Abstract :
This paper describes CIAM, an approach that provides cyber security engineers with an initial prioritization of security controls. The approach incorporates data related to security incidents, vulnerabilities exploited, business impact, and security control costs.
Keywords :
security of data; cyber security engineers; security controls; Computer security; Equations; NIST; Process control; Servers; Cyber security Investment; Security Controls; Security Incident data;
Conference_Titel :
Systems Conference (SysCon), 2012 IEEE International
Conference_Location :
Vancouver, BC
Print_ISBN :
978-1-4673-0748-2
DOI :
10.1109/SysCon.2012.6189500