Controls-based assessment of infrastructure vulnerability

<p>Assessing the vulnerability of an enterprise’s infrastructure is an important step in judging the security of a network and the trustworthiness and quality of the information that flows through it. Currently real-world infrastructure vulnerability is often judged in an ad hoc manner, based...

Full description

Bibliographic Details
Main Author: Farnan, O
Other Authors: Jason, N
Format: Working paper
Language:English
Published: 2014
Subjects:
_version_ 1797074481364074496
author Farnan, O
author2 Jason, N
author_facet Jason, N
Farnan, O
author_sort Farnan, O
collection OXFORD
description <p>Assessing the vulnerability of an enterprise’s infrastructure is an important step in judging the security of a network and the trustworthiness and quality of the information that flows through it. Currently real-world infrastructure vulnerability is often judged in an ad hoc manner, based on the criteria and experience of the assessors. While methodological approaches to assessing infrastructure vulnerability exist, in practice they are not academically rigorous, having grown organically to meet business requirements. Our aim in this paper therefore is to study infrastructure vulnerability from a more structured perspective. We introduce and explore a novel way of assessing computer network infrastructure vulnerability. Instead of attempting to find vulnerabilities in infrastructure, we instead assume the network is insecure, and measure its vulnerability based on the controls that have (and have not) been put in place. We consider different control schemes for addressing vulnerability, and look at how one of them, namely the Council on Cyber Security’s Top 20 Critical Security Controls, can be applied.</p>
first_indexed 2024-03-06T23:36:48Z
format Working paper
id oxford-uuid:6df16c74-d94c-4107-9105-d177377f4c88
institution University of Oxford
language English
last_indexed 2024-03-06T23:36:48Z
publishDate 2014
record_format dspace
spelling oxford-uuid:6df16c74-d94c-4107-9105-d177377f4c882022-03-26T19:21:03ZControls-based assessment of infrastructure vulnerabilityWorking paperhttp://purl.org/coar/resource_type/c_8042uuid:6df16c74-d94c-4107-9105-d177377f4c88ComputingCyber SecurityEnglishOxford University Research Archive - Valet2014Farnan, OJason, N<p>Assessing the vulnerability of an enterprise’s infrastructure is an important step in judging the security of a network and the trustworthiness and quality of the information that flows through it. Currently real-world infrastructure vulnerability is often judged in an ad hoc manner, based on the criteria and experience of the assessors. While methodological approaches to assessing infrastructure vulnerability exist, in practice they are not academically rigorous, having grown organically to meet business requirements. Our aim in this paper therefore is to study infrastructure vulnerability from a more structured perspective. We introduce and explore a novel way of assessing computer network infrastructure vulnerability. Instead of attempting to find vulnerabilities in infrastructure, we instead assume the network is insecure, and measure its vulnerability based on the controls that have (and have not) been put in place. We consider different control schemes for addressing vulnerability, and look at how one of them, namely the Council on Cyber Security’s Top 20 Critical Security Controls, can be applied.</p>
spellingShingle Computing
Cyber Security
Farnan, O
Controls-based assessment of infrastructure vulnerability
title Controls-based assessment of infrastructure vulnerability
title_full Controls-based assessment of infrastructure vulnerability
title_fullStr Controls-based assessment of infrastructure vulnerability
title_full_unstemmed Controls-based assessment of infrastructure vulnerability
title_short Controls-based assessment of infrastructure vulnerability
title_sort controls based assessment of infrastructure vulnerability
topic Computing
Cyber Security
work_keys_str_mv AT farnano controlsbasedassessmentofinfrastructurevulnerability