Quantifying and managing the risk of information security breaches participants in a supply chain

Thesis (M. Eng. in Logistics)--Massachusetts Institute of Technology, Engineering Systems Division, 2005.

Bibliographic Details
Main Author: Bellefeuille, Cynthia Lynn
Other Authors: George Kocur.
Format: Thesis
Language:eng
Published: Massachusetts Institute of Technology 2006
Subjects:
Online Access:http://hdl.handle.net/1721.1/33313
_version_ 1811088573112254464
author Bellefeuille, Cynthia Lynn
author2 George Kocur.
author_facet George Kocur.
Bellefeuille, Cynthia Lynn
author_sort Bellefeuille, Cynthia Lynn
collection MIT
description Thesis (M. Eng. in Logistics)--Massachusetts Institute of Technology, Engineering Systems Division, 2005.
first_indexed 2024-09-23T14:04:10Z
format Thesis
id mit-1721.1/33313
institution Massachusetts Institute of Technology
language eng
last_indexed 2024-09-23T14:04:10Z
publishDate 2006
publisher Massachusetts Institute of Technology
record_format dspace
spelling mit-1721.1/333132019-04-11T02:05:48Z Quantifying and managing the risk of information security breaches participants in a supply chain Quantifying and managing the risk of information security breaches to the supply chain Bellefeuille, Cynthia Lynn George Kocur. Massachusetts Institute of Technology. Engineering Systems Division. Massachusetts Institute of Technology. Engineering Systems Division. Engineering Systems Division. Thesis (M. Eng. in Logistics)--Massachusetts Institute of Technology, Engineering Systems Division, 2005. Includes bibliographical references (leaf 70). Technical integration between companies can result in an increased risk of information security breaches. This thesis proposes a methodology for quantifying information security risk to a supply chain participant. Given a system responsible for supply chain interaction and the vulnerabilities attributed to the system, the variables that determine the probability and severity of security incidents were used to create a model to quantify the risk within three hypothetical information systems. The probability of an incident occurring was determined by rating the availability and ease of performing an exploit, the attractiveness of the target and an estimate of the frequency of the attack occurring Internet wide. In assigning a monetary value to the incident, the outcome from an attack was considered in terms of the direct impact on the business process and the potential impact on partnerships. A method for determining mitigation strategies was then proposed based on a given set of monetary constraints and the realization of corporate security policy. by Cynthia Lynn Bellefeuille. M.Eng.in Logistics 2006-07-13T15:14:34Z 2006-07-13T15:14:34Z 2005 2005 Thesis http://hdl.handle.net/1721.1/33313 62311875 eng M.I.T. theses are protected by copyright. They may be viewed from this source for any purpose, but reproduction or distribution in any format is prohibited without written permission. See provided URL for inquiries about permission. http://dspace.mit.edu/handle/1721.1/7582 74 leaves 3803915 bytes 3806941 bytes application/pdf application/pdf application/pdf Massachusetts Institute of Technology
spellingShingle Engineering Systems Division.
Bellefeuille, Cynthia Lynn
Quantifying and managing the risk of information security breaches participants in a supply chain
title Quantifying and managing the risk of information security breaches participants in a supply chain
title_full Quantifying and managing the risk of information security breaches participants in a supply chain
title_fullStr Quantifying and managing the risk of information security breaches participants in a supply chain
title_full_unstemmed Quantifying and managing the risk of information security breaches participants in a supply chain
title_short Quantifying and managing the risk of information security breaches participants in a supply chain
title_sort quantifying and managing the risk of information security breaches participants in a supply chain
topic Engineering Systems Division.
url http://hdl.handle.net/1721.1/33313
work_keys_str_mv AT bellefeuillecynthialynn quantifyingandmanagingtheriskofinformationsecuritybreachesparticipantsinasupplychain
AT bellefeuillecynthialynn quantifyingandmanagingtheriskofinformationsecuritybreachestothesupplychain