Home // International Journal On Advances in Security, volume 12, numbers 3 and 4, 2019 // View article


Verified Metrics for Continuous Active Defence

Authors:
George O. M. Yee

Keywords: sensitive data, vulnerability, security level, verified metrics, continuous defence

Abstract:
As a sign of the times, headlines today are full of attacks against an organization’s computing infrastructure, resulting in the theft of sensitive data. In response, the organization applies security measures (e.g., encryption) to secure its vulnerabilities. However, these measures are often only applied once, with the assumption that the organization is then protected and no further action is needed. Unfortunately, attackers continuously probe for vulnerabilities and change their attacks accordingly. This means that an organization must also continuously check for new vulnerabilities and secure them, to continuously and actively defend against the attacks. This paper derives metrics that characterize the security level of an organization at any point in time, based on the number of vulnerabilities secured and the effectiveness of the securing measures. The metrics are verified in terms of their soundness using the author’s recently published procedure for deriving good security metrics. The paper then shows how an organization can apply the metrics for continuous active defence.

Pages: 153 to 163

Copyright: Copyright (c) to authors, 2019. Used with permission.

Publication date: December 30, 2019

Published in: journal

ISSN: 1942-2636