kth.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Bridging the gap between business and technology in strategic decision-making for cyber security management
KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering. (Software Systems Architecture & Security)ORCID iD: 0000-0003-1464-6163
KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering. (Lagerström)ORCID iD: 0000-0003-3089-3885
KTH, School of Electrical Engineering (EES), Electric Power and Energy Systems. (Software systems architecture and security)ORCID iD: 0000-0001-7386-7471
2016 (English)In: Proceedings of 2016 Portland International Conference on Management of Engineering and Technology, 2016, p. 32-42Conference paper, Published paper (Refereed)
Abstract [en]

System architectures are getting more and more complex. Thus, making strategic decisions when it comes to managing systems is difficult and needs proper support. One arising issue that managers need to take into account when changing their technology is security. No business is spared from threats in today's connected society. The repercussions of not paying this enough attention could result in loss of money and in case of cyber physical systems, also human lives. Thus, system security has become a high-level management issue. There are various methods of assessing system security. A common method that allows partial automation is attack graph based security analysis. This particular method has many variations and wide tool support. However, a complex technical analysis like the attack graph based one needs experts to run it and interpret the results. In this paper we study what kind of strategic decisions that need the support of threat analysis and how to improve an attack graph based architecture threat assessment method to fit this task. The needs are gathered from experts working with security management and the approach is inspired by an enterprise architecture language called ArchiMate. The paper contains a working example. The proposed approach aims to bridge the gap between technical analysis and business analysis making system architectures easier to manage.

Place, publisher, year, edition, pages
2016. p. 32-42
National Category
Computer Systems
Identifiers
URN: urn:nbn:se:kth:diva-196923DOI: 10.1109/PICMET.2016.7806663ISI: 000403104500004Scopus ID: 2-s2.0-85016211936ISBN: 9781509035953 (print)OAI: oai:DiVA.org:kth-196923DiVA, id: diva2:1049839
Conference
2016 Portland International Conference on Management of Engineering and Technology, PICMET 2016; Honolulu; United States; 4 September 2016 through 8 September 2016
Note

QC 20170609

Available from: 2016-11-25 Created: 2016-11-25 Last updated: 2024-03-15Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records

Välja, MargusLagerström, RobertKorman, MatusFranke, Ulrik

Search in DiVA

By author/editor
Välja, MargusLagerström, RobertKorman, MatusFranke, Ulrik
By organisation
Network and Systems EngineeringElectric Power and Energy Systems
Computer Systems

Search outside of DiVA

GoogleGoogle Scholar

doi
isbn
urn-nbn

Altmetric score

doi
isbn
urn-nbn
Total: 291 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf