Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
A survey on systems security metrics
Pendleton M., Garcia-Lebron R., Cho J., Xu S. ACM Computing Surveys49 (4):1-35,2017.Type:Article
Date Reviewed: Aug 3 2017

As information security becomes a mainstream discipline and is talked about on primetime news and in cafes, among the first questions after the dust around the breach of the day settles would be whether we are secure, and how we measure whether we are secure.

These questions are being raised increasingly in boardrooms and research groups alike because to date there are no answers that satisfy either group. This paper is both a reminder of the various attempts made over the years to propose an approach and also a proposal for a way forward. The authors propose a security metric framework--the dynamic systems security state--that in theory at least takes into account aspects of information security measurement that make it such a hard problem.

Based primarily on three components--system vulnerabilities, attack (or threat) intensity, and power of defense mechanisms--the paper offers ideas for quantification of security metrics through mathematical abstractions and functions.

Because this isn’t a full thesis, the paper doesn’t spend too much time covering practical use cases showing how the authors’ approach could be applied from end to end. However, the study isn’t short on specific examples explaining how various existing metrics miss a key factor, the dynamic nature of the security state, and why separating the security state from the observed state at a particular time (known versus unknown issues) is a critical consideration.

Multiple existing surveys and measurement proposals from 1981 and earlier are referenced, studied, and critiqued to help explain the proposed framework. The authors also clarify the scope and methodology to help establish the constraints and approach in which the measurement techniques may be applied.

The key idea of the paper--categorizing possible attack-defense interactions into four submetrics as vulnerabilities, threats, controls, and context (risk)--in my opinion seems like a good approach to measure security in specific cases, especially during threat modeling phases of the security architecture process.

The paper concludes with ideas for future research directions that are worth exploring because the questions aren’t going away anytime soon. As information security as a science matures beyond audit checklists and point-in-time compliance certifications, this work will play an extremely important role in helping organizations make specific, measurable, achievable, repeatable, and time-bound (SMART) decisions for protecting the digital ecosystem.

Reviewer:  Phoram Mehta Review #: CR145458 (1711-0763)
Bookmark and Share
  Reviewer Selected
Featured Reviewer
 
 
Security and Protection (K.6.5 )
 
 
Introductory And Survey (A.1 )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
CIRCAL and the representation of communication, concurrency, and time
Milne G. ACM Transactions on Programming Languages and Systems 7(2): 270-298, 1985. Type: Article
Oct 1 1985
Computer security risk management
Palmer I., Potter G., Van Nostrand Reinhold Co., New York, NY, 1989. Type: Book (9780442302900)
Apr 1 1991
Computers at risk
, National Academy Press, Washington, DC, 1991. Type: Book (9780309043885)
Oct 1 1991
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy