Using Analytical Hierarchy and Analytical Network Processes to Create Cyber Security Metrics

Authentication, authorization, and accounting are key access control measures that decision makers should consider when crafting a defense against cyber attacks. Two decision theory methodologies were compared. Analytical hierarchy and analytical network processes were applied to cyber security-rela...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Defense AR journal 2017-04, Vol.24 (2), p.186-221
Hauptverfasser: Wilamowski, George, Dever, Jason, Stuban, Steven
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Authentication, authorization, and accounting are key access control measures that decision makers should consider when crafting a defense against cyber attacks. Two decision theory methodologies were compared. Analytical hierarchy and analytical network processes were applied to cyber security-related decisions to derive a measure of effectiveness for risk eval uation. A network/access mobile security use case was employed to develop a generalized application benchmarking framework. Three communities of interest, which include local area network, wide area network, and remote users, were referenced while demonstrating how to prioritize alternatives within weighted rankings. Subjective judgments carry tremendous weight in the minds of cyber security decision makers. An approach that combines these judgments with quantitative data is the key to creating effective defen sive strategies.
ISSN:2156-8391
1553-6408
2156-8405
DOI:10.22594/dau.16-760.24.02