A decision model on optimising cybersecurity controls using organisation preferences

Cybersecurity is an organisational issue that should be looked at through the lens of various stakeholders. However, it is often treated as a siloed issue in which more is always seen as better. The CISOs, CIOs and the key decision-makers struggle to understand how much security is enough. All cyber...

Full description

Bibliographic Details
Main Author: Ansaria, Afra
Other Authors: Shrobe, Howard E.
Format: Thesis
Published: Massachusetts Institute of Technology 2022
Online Access:https://hdl.handle.net/1721.1/139550
_version_ 1826215281165336576
author Ansaria, Afra
author2 Shrobe, Howard E.
author_facet Shrobe, Howard E.
Ansaria, Afra
author_sort Ansaria, Afra
collection MIT
description Cybersecurity is an organisational issue that should be looked at through the lens of various stakeholders. However, it is often treated as a siloed issue in which more is always seen as better. The CISOs, CIOs and the key decision-makers struggle to understand how much security is enough. All cybersecurity solutions, often referred to as controls, result in a residual risk since there is no such thing as perfect security. The level of the risk should ultimately be the choice predicated by the business goals of the organisation. Cybersecurity controls are often presented in a context that lacks sufficient business context, which is required to optimize the risks and balance them with the needs to run other business operations. For uninterrupted business operations, there is a need to bridge the gap between technology and business decision making. Optimizing cybersecurity risk in a business context demands a model that considers the priorities of the organisation through the lens of the key stakeholders. By taking into consideration the overall priorities in the context of the business goals, we can better guide the decision process of choosing the optimal security controls. Such an approach would help answer questions such as ‘How can we manage cybersecurity risk in the company? What are the right cybersecurity controls for our business goals? How much should we spend on cybersecurity?’ There is no one perfect formula when it comes to picking security controls. Each organisation has a different set of priorities and thus the needs for its security controls will be different. An optimal solution requires a balanced approach towards the risk, cost and benefit of the solution. A thorough analysis of the overall costs and the benefit of implementing each control, and its potential risk, would enable the decision-maker to pick controls that are in line with the business goals. The work of this thesis will involve looking at the trade-offs of security controls, which are influenced by the organisation's priorities, with respect to the cost and value they bring to the organisation. We will be representing the organisation's priorities as preferences. These preferences are then translated into a utility function that can be used to evaluate the controls available. Once the list of preferred controls is gathered, we will analyze the cost and benefit relationship for each of the controls. The cost and benefit are represented in terms of the value defined by the organisation to its processes and business units that are under threat. Finally, we will look for an optimal range of potential controls and their placement, which can provide utmost security to the organisation while keeping the business preferences in place.
first_indexed 2024-09-23T16:21:41Z
format Thesis
id mit-1721.1/139550
institution Massachusetts Institute of Technology
last_indexed 2024-09-23T16:21:41Z
publishDate 2022
publisher Massachusetts Institute of Technology
record_format dspace
spelling mit-1721.1/1395502022-01-15T03:04:05Z A decision model on optimising cybersecurity controls using organisation preferences Ansaria, Afra Shrobe, Howard E. Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science System Design and Management Program. Cybersecurity is an organisational issue that should be looked at through the lens of various stakeholders. However, it is often treated as a siloed issue in which more is always seen as better. The CISOs, CIOs and the key decision-makers struggle to understand how much security is enough. All cybersecurity solutions, often referred to as controls, result in a residual risk since there is no such thing as perfect security. The level of the risk should ultimately be the choice predicated by the business goals of the organisation. Cybersecurity controls are often presented in a context that lacks sufficient business context, which is required to optimize the risks and balance them with the needs to run other business operations. For uninterrupted business operations, there is a need to bridge the gap between technology and business decision making. Optimizing cybersecurity risk in a business context demands a model that considers the priorities of the organisation through the lens of the key stakeholders. By taking into consideration the overall priorities in the context of the business goals, we can better guide the decision process of choosing the optimal security controls. Such an approach would help answer questions such as ‘How can we manage cybersecurity risk in the company? What are the right cybersecurity controls for our business goals? How much should we spend on cybersecurity?’ There is no one perfect formula when it comes to picking security controls. Each organisation has a different set of priorities and thus the needs for its security controls will be different. An optimal solution requires a balanced approach towards the risk, cost and benefit of the solution. A thorough analysis of the overall costs and the benefit of implementing each control, and its potential risk, would enable the decision-maker to pick controls that are in line with the business goals. The work of this thesis will involve looking at the trade-offs of security controls, which are influenced by the organisation's priorities, with respect to the cost and value they bring to the organisation. We will be representing the organisation's priorities as preferences. These preferences are then translated into a utility function that can be used to evaluate the controls available. Once the list of preferred controls is gathered, we will analyze the cost and benefit relationship for each of the controls. The cost and benefit are represented in terms of the value defined by the organisation to its processes and business units that are under threat. Finally, we will look for an optimal range of potential controls and their placement, which can provide utmost security to the organisation while keeping the business preferences in place. S.M. S.M. 2022-01-14T15:19:14Z 2022-01-14T15:19:14Z 2021-06 2021-06-25T20:15:27.096Z Thesis https://hdl.handle.net/1721.1/139550 9848 In Copyright - Educational Use Permitted Copyright retained by author(s) https://rightsstatements.org/page/InC-EDU/1.0/ application/pdf Massachusetts Institute of Technology
spellingShingle Ansaria, Afra
A decision model on optimising cybersecurity controls using organisation preferences
title A decision model on optimising cybersecurity controls using organisation preferences
title_full A decision model on optimising cybersecurity controls using organisation preferences
title_fullStr A decision model on optimising cybersecurity controls using organisation preferences
title_full_unstemmed A decision model on optimising cybersecurity controls using organisation preferences
title_short A decision model on optimising cybersecurity controls using organisation preferences
title_sort decision model on optimising cybersecurity controls using organisation preferences
url https://hdl.handle.net/1721.1/139550
work_keys_str_mv AT ansariaafra adecisionmodelonoptimisingcybersecuritycontrolsusingorganisationpreferences
AT ansariaafra decisionmodelonoptimisingcybersecuritycontrolsusingorganisationpreferences