Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Bridging the gap between business and technology in strategic decision-making for cyber security management
KTH, School of Electrical Engineering (EES), Electric Power and Energy Systems. (Software systems architecture and security)ORCID iD: 0000-0003-1464-6163
KTH, School of Electrical Engineering (EES), Electric Power and Energy Systems. (Software systems architecture and security)ORCID iD: 0000-0003-3089-3885
KTH, School of Electrical Engineering (EES), Electric Power and Energy Systems. (Software systems architecture and security)ORCID iD: 0000-0001-7386-7471
2017 (English)In: Proceedings of 2016 Portland International Conference on Management of Engineering and Technology, 2017, 32-42 p.Conference paper, Published paper (Refereed)
Abstract [en]

System architectures are getting more and more complex. Thus, making strategic decisions when it comes to managing systems is difficult and needs proper support. One arising issue that managers need to take into account when changing their technology is security. No business is spared from threats in today's connected society. The repercussions of not paying this enough attention could result in loss of money and in case of cyber physical systems, also human lives. Thus, system security has become a high-level management issue. There are various methods of assessing system security. A common method that allows partial automation is attack graph based security analysis. This particular method has many variations and wide tool support. However, a complex technical analysis like the attack graph based one needs experts to run it and interpret the results. In this paper we study what kind of strategic decisions that need the support of threat analysis and how to improve an attack graph based architecture threat assessment method to fit this task. The needs are gathered from experts working with security management and the approach is inspired by an enterprise architecture language called ArchiMate. The paper contains a working example. The proposed approach aims to bridge the gap between technical analysis and business analysis making system architectures easier to manage.

Place, publisher, year, edition, pages
2017. 32-42 p.
National Category
Computer Systems
Identifiers
URN: urn:nbn:se:kth:diva-196923ISBN: 9781509035953 (print)OAI: oai:DiVA.org:kth-196923DiVA: diva2:1049839
Conference
2016 Portland International Conference on Management of Engineering and Technology, PICMET 2016; Honolulu; United States; 4 September 2016 through 8 September 2016
Note

QCR 20161128

QC 20170609

Available from: 2016-11-25 Created: 2016-11-25 Last updated: 2017-06-09Bibliographically approved

Open Access in DiVA

No full text

Search in DiVA

By author/editor
Margus, VäljaRobert, LagerströmKorman, MatusFranke, Ulrik
By organisation
Electric Power and Energy Systems
Computer Systems

Search outside of DiVA

GoogleGoogle Scholar

Total: 189 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf