Threat and Risk Assessment Using Continuous Logic

Threat and Risk Assessment Using Continuous Logic

Copyright: © 2022 |Pages: 17
DOI: 10.4018/978-1-6684-3698-1.ch007
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Threat and Risk Assessment is an important area in cybersecurity. It covers multiple systems and organizations where cybersecurity is significant, such as banking, industry, SCADA, Energy Management System, among many others. The chapter presents a method to help assessing threats and risks associated with computer and networks systems. It integrates the Framework for Improving Critical Infrastructure Cybersecurity—developed by the National Institute of Standards and Technology—with a quantitative method based on the use of a Continuous Logic, the Logic Scoring of Preference (LSP) method. LSP is a method suitable for decision making that provides the guidelines to produce a model to assist the expert in the process of assessing how much a product or system satisfy a number of requirements, in this case associated to the identification, protection, detection, response and recovery of threat and risks in an organization.
Chapter Preview
Top

Background

The next two subsections discuss related work on threat and risk assessment and introduce some concepts of the LSP method necessary to understand the rest of the work.

Complete Chapter List

Search this Book:
Reset