Selecting Optimal Subset of Security Controls

Article OPEN
Yevseyeva, I.; Basto-Fernandes, V.; Michael, Emmerich, T. M.; Moorsel, van, A.;
(2015)
  • Publisher: Elsevier BV
  • Journal: Procedia Computer Science,volume 64,pages1,035-1,042 (issn: 1877-0509)
  • Related identifiers: doi: 10.1016/j.procs.2015.08.625
  • Subject: subset selection | security | multicriteria optimisation | portfolio optimization

Open Access journal Choosing an optimal investment in information security is an issue most companies face these days. Which security controls to buy to protect the IT system of a company in the best way? Selecting a subset of security controls among many available o... View more
  • References (26)
    26 references, page 1 of 3

    1. 10 Steps to cyber security: executive companion. BIS/12/1120. Published on 5 September 2012. https://www.gov.uk/government/publications/cyber-risk-management-a-board-level-responsibility

    2. Mobile Devices. Guide for Implementers. Published in February 2013. MWR InfoSecurity. https://www.cpni.gov.uk/Documents/Publications/Non-CPNI_pubs/2013-02-22-mobile_devices_guide_for_implementers.pdf

    3. Consumerization of IT: Risk Mitigation Strategies. Responding to the Emerging Threat Environment. ENISA Deliverable. Published on 19 December 2012. http://www.enisa.europa.eu/activities/risk-management/evolving-threat-environment/COIT_Mitigation_Strategies_Final_Report

    4. ISO/IEC 27002, Information Technology - Security Techniques - Code of practice for information security management, 2005. http://www.iso.org/iso/catalogue_detail?csnumber=50297

    5. Miettinen K.: Nonlinear Multiobjective Optimization. Kluwer, 1999.

    6. Bäck Th., Fogel D.B. and Michalewicz Z.(Editors): Handbook of Evolutionary Computation, Taylor and Francis, 1997.

    7. Deb K.: Multi-Objective Optimization Using Evolutionary Algorithms, Wiley, Chichester, UK, 2001.

    8. Eiben A.E. and Smith J.E.: Introduction to Evolutionary Computing, Springer, Natural Computing Series, Corr. 2nd printing, 2007

    9. Gordon L.A. and Loeb M.P. Managing Cybersecurity Resources: A cost-benefit analysis. McGraw-Hill Inc. 2006.

    10. Rakes T.R., Deane J.K., Rees L.P. IT security planning under uncertainty for high-impact events, Omega: International Journal of Management Science 40 (1) (2012) 79-8.

  • Metrics
    0
    views in OpenAIRE
    0
    views in local repository
    25
    downloads in local repository

    The information is available from the following content providers:

    FromNumber Of ViewsNumber Of Downloads
    De Montfort University Open Research Archive - IRUS-UK 0 25
Share - Bookmark