Selecting optimal subset of security controls

dc.cclicenceCC-BYen
dc.contributor.authorYevseyeva, Irynaen
dc.contributor.authorBasto-Fernandes, V.en
dc.contributor.authorEmmerich, M. T. M.en
dc.contributor.authorvan Moorsel, Aaden
dc.date.acceptance2015-09-15en
dc.date.accessioned2016-05-23T15:52:08Z
dc.date.available2016-05-23T15:52:08Z
dc.date.issued2015-09-15
dc.descriptionOpen Access journalen
dc.description.abstractChoosing an optimal investment in information security is an issue most companies face these days. Which security controls to buy to protect the IT system of a company in the best way? Selecting a subset of security controls among many available ones can be seen as a resource allocation problem that should take into account conflicting objectives and constraints of the problem. In particular, the security of the system should be improved without hindering productivity, under a limited budget for buying controls. In this work, we provide several possible formulations of security controls subset selection problem as a portfolio optimization, which is well known in financial management. We propose approaches to solve them using existing single and multiobjective optimization algorithms.en
dc.explorer.multimediaNoen
dc.funderEngineering and Physical Sciences Research Council (EPSRC), UK, and Government Communications Headquarters (GCHQ), UK, for funding Choice Architecture for Information Security (ChAISe) project EP/K006568/1 as a part of Cyber Research Instituteen
dc.funderEPSRC (Engineering and Physical Sciences Research Council)en
dc.identifier.citationYevseyeva, I., Basto-Fernandes, V., Emmerich, M.T.M. and van Moorsel A. (2015) Selecting optimal subset of security controls. CENTERIS’15, 7th Conference of ENTERprise Information Systems, Procedia Computer Science, 64, pp. 1035-1042en
dc.identifier.doihttps://doi.org/10.1016/j.procs.2015.08.625
dc.identifier.urihttp://hdl.handle.net/2086/12080
dc.language.isoenen
dc.peerreviewedYesen
dc.projectidEP/K006568/1en
dc.publisherElsevieren
dc.researchgroupCyber Security Centreen
dc.researchinstituteCyber Technology Institute (CTI)en
dc.subjectmulticriteria optimisationen
dc.subjectsecurityen
dc.subjectsubset selectionen
dc.subjectportfolio optimizationen
dc.titleSelecting optimal subset of security controlsen
dc.typeArticleen

Files

Original bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
dsecurityportfolio_final.doc
Size:
431.5 KB
Format:
Microsoft Word
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
4.2 KB
Format:
Item-specific license agreed upon to submission
Description: