An Open Source Tool to Support the Quantitative Assessment of Cybersecurity
Đã lưu trong:
| Xuất bản năm: | International Conference on Cyber Warfare and Security (2017), p. 244-254 |
|---|---|
| Tác giả chính: | |
| Tác giả khác: | , |
| Được phát hành: |
Academic Conferences International Limited
|
| Những chủ đề: | |
| Truy cập trực tuyến: | Citation/Abstract Full Text Full Text - PDF |
| Các nhãn: |
Không có thẻ, Là người đầu tiên thẻ bản ghi này!
|
MARC
| LEADER | 00000nab a2200000uu 4500 | ||
|---|---|---|---|
| 001 | 1897683999 | ||
| 003 | UK-CbPIL | ||
| 035 | |a 1897683999 | ||
| 045 | 2 | |b d20170101 |b d20171231 | |
| 084 | |a 142229 |2 nlm | ||
| 100 | 1 | |a Nagaraju, Vidhyashree | |
| 245 | 1 | |a An Open Source Tool to Support the Quantitative Assessment of Cybersecurity | |
| 260 | |b Academic Conferences International Limited |c 2017 | ||
| 513 | |a Conference Proceedings | ||
| 520 | 3 | |a Software reliability and cybersecurity are critical to system integrity. Security violations in defense systems are an especially grave threat to national security and the focus of significant resources. Major defense acquisition programs (MDAP) are those that meet or exceed Acquisition Category One (ACAT I), which is determined by a cost estimate in excess of hundreds of millions of dollars. Inadequate cybersecurity has contributed to at least one MDAP declaring a Nunn-McCurdy Breach, which requires (i) Congress be notified when the cost per unit increases more than 25% beyond what was originally estimated and (ii) program termination for cost growth greater than 50%. Achieving cybersecurity cost effectively is therefore critical to the national defense and economic well-being of the United States. This paper presents an open source tool to support the quantitative assessment of software reliability and cybersecurity as well as the underlying mathematical theory and algorithmic details. The tool enables assessment of a system's security from penetration testing data and can be used to estimate the number of vulnerabilities remaining within the software as well as the additional penetration testing required to reduce the rate of vulnerability exploitation to a desired level with a specified level of confidence. This top down approach can be applied to systems such as vehicles as well as information systems, including those that must safeguard defense facilities, their contractors, and other government buildings. This approach will enable organizations that acquire software to establish quantitative requirements that can be included in contracts, providing clear thresholds for software and system developers to achieve. The tool will enable contractors to regularly assess the security of their software with respect to requirements, thereby facilitating the identification and reporting of programs that may fail to achieve contractually specified security objectives. This regular assessment and reporting will enable closer collaboration between government agencies and contractors to ensure that systems achieve a desired level of security to reduce the risk of cost and schedule overruns that would otherwise threaten deployment of secure systems. | |
| 651 | 4 | |a United States--US | |
| 653 | |a Computer engineering | ||
| 653 | |a Software reliability | ||
| 653 | |a National security | ||
| 653 | |a Open source software | ||
| 653 | |a Contractors | ||
| 653 | |a Reliability analysis | ||
| 653 | |a Defense programs | ||
| 653 | |a Information systems | ||
| 653 | |a Public buildings | ||
| 653 | |a Cost estimates | ||
| 653 | |a Cybersecurity | ||
| 653 | |a Risk reduction | ||
| 653 | |a Reliability | ||
| 653 | |a Exploitation | ||
| 653 | |a Termination | ||
| 653 | |a Software | ||
| 653 | |a Economic well being | ||
| 653 | |a Government agencies | ||
| 653 | |a Well being | ||
| 653 | |a Morality | ||
| 653 | |a Copyright | ||
| 653 | |a Evaluation | ||
| 653 | |a Costs | ||
| 653 | |a Deployment | ||
| 653 | |a Cost analysis | ||
| 653 | |a Government contracts | ||
| 653 | |a Economic wellbeing | ||
| 653 | |a Military policy | ||
| 653 | |a Information technology | ||
| 653 | |a Thresholds | ||
| 653 | |a Penetration | ||
| 653 | |a Defense contracts | ||
| 653 | |a Violations | ||
| 700 | 1 | |a Fiondella, Lance | |
| 700 | 1 | |a Wandji, Thierry | |
| 773 | 0 | |t International Conference on Cyber Warfare and Security |g (2017), p. 244-254 | |
| 786 | 0 | |d ProQuest |t Political Science Database | |
| 856 | 4 | 1 | |3 Citation/Abstract |u https://www.proquest.com/docview/1897683999/abstract/embedded/L8HZQI7Z43R0LA5T?source=fedsrch |
| 856 | 4 | 0 | |3 Full Text |u https://www.proquest.com/docview/1897683999/fulltext/embedded/L8HZQI7Z43R0LA5T?source=fedsrch |
| 856 | 4 | 0 | |3 Full Text - PDF |u https://www.proquest.com/docview/1897683999/fulltextPDF/embedded/L8HZQI7Z43R0LA5T?source=fedsrch |