Asset Priority Risk Assessment Using Hidden Markov Models

  • James D. Cannady
  • , Charles Pak

    Research output: Contribution to journalConference article

    Abstract

    Conducting risk assessment on organizational assets can be time consuming, burdensome, and misleading in many cases because of the dynamically changing security states of assets. Risk assessments may present inaccurate or false data if the organizational assets change in their security postures. Each asset can change its security status from secure, mitigated, vulnerable, or compromised states. The secure state is only temporary and imaginary; it may never exist. Therefore, it is accurate to say that each asset changes its security state within its mitigated, vulnerable, or compromised, state. If we can predict each asset’s security state prior to its actual state, we would have a good risk indicator for the organization’s mission-critical assets. In this paper, we explore possible security states from the insider’s perspective, as there are more security incidents initiated from inside than outside an organization. However, we are in a continuous loop of mitigating dynamically changing assets caused by both internal and external threats.

    Original languageAmerican English
    Pages (from-to)65-73
    Number of pages9
    JournalProceedings of the 10th ACM Conference on SIG-Information Technology Education
    DOIs
    StatePublished - Oct 22 2009
    Event10th ACM Conference on SIG-Information Technology Education -
    Duration: Oct 1 2009 → …

    Keywords

    • Risk Assessment
    • Risk assessment

    Disciplines

    • Computer Sciences

    Fingerprint

    Dive into the research topics of 'Asset Priority Risk Assessment Using Hidden Markov Models'. Together they form a unique fingerprint.

    Cite this