MASISCo—Methodological Approach for the Selection of Information Security Controls
Abstract
:1. Introduction
- 1
- Methodological approach for control selection: From the above, the main contribution of this article is the proposal of a methodological approach for the optimal selection of security controls. This approach allows systematizing a process that, to date, is not structured but depends on the criteria of each security expert.This work defines: (i) stages of the process, (ii) categorizes possible situations that can be faced, (iii) proposes techniques to be applied in each category, and (iv) details the products at each stage of the process.The advantages of this approach are mainly related to the systematization of the process, the possibility of solving complex recommendation problems, and the reduction of the time required to solve the problem.
- 2
- Proposal evaluation: This paper also evaluates the proposal by applying a methodology adoption study. This empirical study provides relevant information regarding adopting the methodological proposal by a group of new consultants in information security analysis.In this sense, a tendency towards adopting the proposal by the subjects of the study was evidenced, showing that the proposed model is perceived as a helpful tool for making security investment recommendations. However, the study showed that the design of the optimization model is complex to structure for someone who needs more knowledge in this area.
- 3
- Software tool for control selection: Another significant contribution of this research is the design and development of a prototype software tool that supports the proposal’s application. This tool supports the user in all process phases, from information collection to the optimization model’s resolution.
2. Materials and Methods
- i
- Problem investigation, where the stages of “Problem identification” and “Objective definition” were developed.
- ii
- Design of the proposal, where we built the methodological approach and identified the techniques and tools, covering the stages of “Design and development” and “Demonstration.”
- iii
- Evaluation of the proposal, where the validation framework was defined, including the measurement instruments and the validation process, applied, covering the “Evaluation” stage of the method.
- iv
- The “Communication” stage corresponds to the presentation of the results of the research work.
2.1. Phase 1: Problem Investigation
2.2. Phase 2: Proposal Design
2.3. Phase 3: Proposal Evaluation
3. Results
3.1. Phase 1: Investigation of the Problem
3.2. Phase 2: Proposal Design
3.2.1. Diagnostic
3.2.2. Recommendation
- a
- The first refers to the identification of the optimization problem to be solved. The result of this stage is a detailed description of the problem, which specifies: (i) the objective, (ii) the constraints to be considered, and (iii) the parameters of the variables that define the objective, as well as the organization’s constraints.Table 2 summarizes seven situations a security assessor may face when making recommendations. We have classified them according to their objective, in order of increasing complexity: prioritization, selection, or scheduling problems.The prioritization of controls refers to ordering controls concerning one or more criteria, for example, risk or cost, prioritizing from highest to lowest value or vice versa.In the case of selection, there is a recommendation of a subset of controls concerning the entire set based on the organization’s objectives and constraints.In the case of scheduling, it not only selects a subset of controls but also determines the implementation sequence of the selected controls based on some criteria.In addition, for each situation identified, we list the OR technique or method that can be applied for its modeling and solution.These situations are detailed in depth in [31]. This definition of problem types, categorized by objective, facilitates subsequent modeling since each of these situations requires different modeling and the use of different OR techniques for their resolution. Thus, the proposal supports security advisors in selecting these modeling and resolution techniques for the situation.
- b
- The second process refers to modeling the situation as an optimization problem. The result of this stage is the mathematical model derived from the formats found in the OR field.In this process, it is necessary to determine the conditions and restrictions to be included in the modeling. In this sense, the proposal proposes the need to establish three aspects:
- Improvement plan objectives;
- The constraints of the organization;
- The relevant parameters for modeling.
Concerning the objective sought by the organization, it must establish what it hopes to achieve or satisfy with the selection process. Some examples of valid objectives are:- Maximize the number of controls to be implemented or maximize the benefit of implementing the group of controls;
- Minimize the risk of non-implementation of controls, or minimize the implementation time of the group of controls.
According to an optimization problem, these objectives represent the model equation that will drive the resolution of the problem. Therefore, it is important to clearly define what the organization is looking for when selecting the subset of controls. In addition, the situation to be modeled may have more than one objective, such as maximizing implementation progress and minimizing risks, which would correspond to a multi-objective problem and thus apply other optimization techniques.On the other hand, it is also necessary to establish the conditions or restrictions the organization must consider when making the recommendation. Usually, these restrictions are associated with the availability of resources that the organization has to implement a possible improvement plan. Some examples of restrictions could be:- A certain budget level;
- A specific time to carry out the implementation project;
- A certain level of risk that the organization needs to reduce.
Finally, in order to perform the modeling of the constraints and objectives, it is necessary to establish some relevant parameters for the modeling, such as:- Implementation cost per control;
- Implementation time for each control;
- The benefit associated with the implementation of the control;
- Risk associated with each control.
Once the consultant has defined the parameters, the model equations and the variables that comprise them are constructed. To define these equations, it is necessary to determine which are the variables that, in the IS context, allow modeling the situation as an optimization problem. In [31], we proposed an ontology that integrates the main concepts and variables found in a selection problem. In Figure 5, we refer to this model.Generally speaking, any concepts in the diagram can be part of an objective function, and the different paths defined by their navigability are potential constraint considerations. - c
- Finally, the third process refers to the solution of the proposed model through the various optimization problem-solving techniques proposed in the OR.The problem of model-solving is relatively simple. First, the model developed in the previous step is written in some modeling language for optimization problems. After this step, the resolution can be done manually, using the various techniques for solving this type of problem, or using some tool or computer application that supports these techniques.Several software packages cover this process supporting different optimization languages. Some of these applications are summarized in Table 3. In addition, as can be seen, there are several free or paid options for Web environments or workstations that support different modeling languages for this type of problem.
3.2.3. Communication
- Opportunities for improvement, if specified in the audit plan;
- Agreed action plans, if any.
- Recommended controls;
- Value of the target achievement (objective function);
- Summary of resource utilization (constraints).
3.3. Proposal Validation
- Training: As a first stage of the experience, students needed to be trained in using the proposed methodological framework. Then, the students had to solve a set of hypothetical cases. Next, they had to identify a set of “non-conformities” and propose an improvement plan by selecting the optimal set of controls. Then, half of the hypothetical cases were to be solved traditionally, i.e., based on the study of the standards and their analysis of the situation, while the other half were to be solved using the proposed model. Finally, each student was randomly assigned a set of cases to solve.Given the impossibility of splitting the groups to control the possible effect or bias that the order of the treatments (without/with the help of the proposal) could have on the results, the students first carried out the case studies without using the proposal. After this stage, they were trained in using the proposal, through its application in various cases and examples. At the end of this phase, we can assume that the students had the same skill level with both treatments.
- Application: After applying the proposal in the training cases, the students carried out an audit project in an organization of their choice in the context of Information Security. In this project, the students formed teams of three people. Each group applied the proposal to subsequently evaluate the level of suitability of the proposal for the resolution of actual cases.
- Evaluation:The final step of the study consisted of students evaluating, using the UMAM-Q instrument, the usefulness, ease of use, social norm, and perceived compatibility, as well as their intention to use the proposal in the future for diagnosis and making safety recommendations.For the analysis of the student’s responses, we applied three types of studies: (i) analysis of descriptive statistics, (ii) analysis of qualitative responses, and (iii) multiple linear regression study.
Result Analysis
Descriptive Statistics
Qualitative Opinions
Quantitative Analysis: Multiple Linear Regression
- a.
- The dependent variable is of the ratio type (continuous).
- b.
- The independent variables are ratio type.
- c.
- There is a linear relationship between the dependent and independent variables, individually and collectively.
- d.
- Homoscedasticity of variances.
- e.
- Independence of observations.
- f.
- There is no multicollinearity between the independent variables.
- g.
- No hay puntos inusuales o que influyan de manera indebida.
- h.
- Residuals of the regression line follow an approximately normal distribution.
- a
- Students reacted favorably to the proposal.The evaluation results show that they are consistent among the three types of analysis performed. These results indicate that the students perceive the methodological proposal as a helpful tool for selecting the set of security controls that best fits the conditions of the organization under study. In addition, the students perceive that the proposal is compatible with how the security professional works, which indicates that it is in line with the work of a security assessor, so it can be considered a contribution and not a hindrance for the assessor. On the other hand, the students perceive that the proposal presents a certain degree of difficulty in its application, mainly due to the student’s lack of knowledge of OR techniques to solve an optimization problem.Regarding the IoA of the methodological proposal, it presents a slightly positive trend, which implies that there is a good chance that the subjects will adopt the proposal. However, this possibility is not high, so there is room for improvement. In addition, if we consider that the students expressed as weakness the FU and that the IoA is strongly related to the perception of the C of the method, we can deduce that improvement actions should focus on these two aspects preferentially.
- b
- The proposed model is consistent.Analysis of the three studies’ results shows the proposal’s consistency concerning the factors that explain the IoA. This effect is evidenced in the student’s responses, collected with the UMAM-Q instrument, the qualitative perceptions stated by the students, and the Linear Regression study applied to reflect that the strengths of the proposal are C and U. At the same time, the main weakness lies in its EU.In addition, from the results of the regression study, it was also evident that the model is highly significant, which implies that the UMAM is a reliable model for predicting IoA. The above, together with the results of the qualitative study and the analysis of the descriptive statistics, give great significance to the opinions of the students, so we can be confident in the results that indicate that the methodological proposal is an excellent tool to support the decision-making process regarding the selection of security controls.
- a
- Size of the study group.The main problem with the study is the low number of subjects who took part in it. Only 12 students responded to the consultation instrument. While it is true that this number represents 100% of the universe of students involved in the study, the group is insufficient, so it is not possible to generalize the results to the general population of auditors, not even audit students. However, these results make it possible to establish a trend and basis on which to design a future process of improvement to the proposal before expanding it to other areas and carrying out a more ambitious empirical study.
- b
- Study group characteristics.Another important factor to consider, also related to the study’s external validity, is the group’s representativeness with respect to the target audience of the proposal. We recognize that the students included in the sample are not expert security advisors but have basic knowledge of the area and the practices of a security advisor. However, it is worth mentioning that the subject within the study program aims precisely to provide this knowledge to the student and that it is the only subject dedicated to this area so that any recent graduate will have the same knowledge as the students who participated in the study. In addition, we train students in applying the methodological approach, constructing and executing the optimization models, and interpreting the results.
3.4. Support Tool
- It does not cover all possible casuistry of optimization problems.
- Currently, the tool does not display reports or interpretations regarding the selected set of controls but only delivers the file provided by NEOS-Server for manual reading.
- Continue including the optimization cases described in the proposals, with their respective variants.
- Improve the way results are displayed and develop new views for viewing and interpreting reports with the optimization process results.
- Validate the use of the tool through an empirical study showing its impact on the consultant’s work.
4. Conclusions
- The proposal includes a set of situations describing the possible scenarios an organization would like to advance. However, we recognize that this set is not definitive but can be completed by identifying new scenarios that organizations would like to incorporate into the model.Therefore, one way forward is to identify, in conjunction with security experts, other approaches to those already proposed, which will allow both to identify new ways to complete and improve those presented in this work and to identify additional cases to the types already recognized. With this information, a new consultation of the literature can be made to identify those optimization techniques or models that would allow the solution of the new scenarios proposed.In addition to the scenarios, we will include new information security standards or norms. This way, the approach will be able to cover better particular cases where the assessment must be based on one or more standards. Currently, the approach considers the ISO 27001 standard, the Supreme Decree 83 [95], and the Methodological Guide for information security of the Chilean Government [96].
- Another research path is related to the conceptualization of the information security field in identifying the variables that interact with this problem and the relationships between them.In this research work, we defined a conceptual framework that integrates a set of views of the problem. However, it is possible to expand it to consider new variables or relationships that were not identified. The same techniques can be used for this identification as the previous point, such as interviews or focus groups with security experts.
- The third line of work focuses on the future software tool development that supports the proposal. For example, if optimization problems and solutions continue to be defined, it is necessary to update the tool to incorporate these new scenarios. On the other hand, we must also update the tool concerning the new version of the ISO/IEC 27001:2022 standard and the controls present in ISO/IEC 27002:2022.This future development can be considered from the perspective of intelligent systems in such a way that the recommender becomes an assistant to the security expert, capable of supporting him in making decisions and guiding the creation and resolution of scenarios that have not been considered from the beginning. In other words, the system could assist the user in creating models that represent the organization’s reality, even if those cases are not considered based on the application.
- Finally, we must mention the need for future validation of the proposal with security experts in a professional context. The validation presented in this article, given that it was the first application of the proposal, was only aimed at identifying a series of opportunities for improvement through the collection of user perceptions. Nevertheless, with the conclusions from this study, it was possible to identify the proposal’s weaknesses and implement the corresponding improvements.
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Miloslavskaya, N.; Tolstoy, A. Internet of things: Information security challenges and solutions. Clust. Comput. 2019, 22, 103–119. [Google Scholar] [CrossRef]
- Mariano Díaz, R. La Ciberseguridad en Tiempos del COVID-19 y el Tránsito Hacia una Ciberinmunidad; CEPAL: Santiago, Chile, 2020. [Google Scholar]
- Conteh, N.Y.; Schmick, P.J. Cybersecurity: Risks, vulnerabilities and countermeasures to prevent social engineering attacks. Int. J. Adv. Comput. Res. 2016, 6, 31. [Google Scholar] [CrossRef]
- Cram, W.A.; Brohman, K.; Gallupe, R.B. Information systems control: A review and framework for emerging information systems processes. J. Assoc. Inf. Syst. 2016, 17, 2. [Google Scholar] [CrossRef] [Green Version]
- Sousa, V. A Review on Cyber Attacks and Its Preventive Measures. In Proceedings of the Digital Privacy and Security Conference, Porto, Portugal, 16 January 2019; Volume 92. [Google Scholar]
- Bojanc, R.; Jerman-Blažič, B. An economic modelling approach to information security risk management. Int. J. Inf. Manag. 2008, 28, 413–422. [Google Scholar] [CrossRef]
- Dubois, É.; Heymans, P.; Mayer, N.; Matulevičius, R. A Systematic Approach to Define the Domain of Information System Security Risk Management. In Intentional Perspectives on Information Systems Engineering; Springer: Berlin/Heidelberg, Germany, 2010; pp. 289–306. [Google Scholar] [CrossRef] [Green Version]
- International Organization for Standardization. ISO/IEC Guide 73:2009—Risk management—Vocabulary. 2009. Available online: https://www.iso.org/standard/44651.html (accessed on 15 October 2022).
- Knight, K.W. AS/NZS ISO 31000: 2009-the new standard for managing risk. Keep. Good Co. 2010, 62, 68. [Google Scholar]
- Mellado, D.; Blanco, C.; Sánchez, L.E.; Fernández-Medina, E. A systematic review of security requirements engineering. Comput. Stand. Interfaces 2010, 32, 153–165. [Google Scholar] [CrossRef]
- Khan, N.F.; Ikram, N. Security Requirements Engineering: A Systematic Mapping (2010-2015). In Proceedings of the 2016 International Conference on Software Security and Assurance (ICSSA), St. Pölten, Austria, 24–25 August 2016. [Google Scholar] [CrossRef]
- Basin, D.; Doser, J.; Lodderstedt, T. Model driven security for process-oriented systems. In Proceedings of the Eighth ACM Symposium on Access Control Models and Technologies—SACMAT’03, Como Italy, 2–3 June 2003; ACM Press: New York, NY, USA, 2003. [Google Scholar] [CrossRef] [Green Version]
- Basin, D.; Doser, J.; Lodderstedt, T. Model driven security. ACM Trans. Softw. Eng. Methodol. 2006, 15, 39–91. [Google Scholar] [CrossRef]
- Toval, A.; Nicolás, J.; Moros, B.; García, F. Requirements Reuse for Improving Information Systems Security: A Practitioner’s Approach. Requir. Eng. 2002, 6, 205–219. [Google Scholar] [CrossRef]
- Alberts, C.J.; Dorofee, A.J. OCTAVE Method Implementation Guide Version 2.0. Volume 1: Introduction; Technical Report; Software Engineering Institute, Carnegi Mellon: Pittsburgh, PA, USA, 2001. [Google Scholar] [CrossRef]
- Vraalsen, F.; Mahler, T. Assessing enterprise risk level: The CORAS approach. In Advances in Enterprise Information Technology Security; IGI Global: Pennsylvania, PA, USA, 2007; pp. 311–333. [Google Scholar]
- International Organization for Standardization. ISO/IEC 27001:2013—Information Security Management. 2013. Available online: http://www.iso.org/iso/home/standards/management-standards/iso27001.htm (accessed on 15 October 2022).
- National Institute of Standards and Technology (NIST). Cybersecurity. 2017. Available online: https://www.nist.gov/topics/cybersecurity (accessed on 15 October 2022).
- ISACA. Control Objectives for Information and Related Technologies (COBIT). 2017. Available online: http://www.isaca.org/Knowledge-Center/cobit/Pages/Products.aspx (accessed on 20 December 2018).
- Whitman, M.E.; Mattord, H.J. Principles of Information Security; Cengage Learning: Boston, MA, USA, 2021. [Google Scholar]
- Singh, A.N.; Gupta, M.; Ojha, A. Identifying factors of “organizational information security management”. J. Enterp. Inf. Manag. 2014, 27, 644–667. [Google Scholar] [CrossRef]
- Stoll, M. An information security model for implementing the new ISO 27001. In Handbook of Research on Emerging Developments in Data Privacy; IGI Global: Pennsylvania, PA, USA, 2015; pp. 216–238. [Google Scholar]
- Chang, S.E.; Ho, C.B. Organizational factors to the effectiveness of implementing information security management. Ind. Manag. Data Syst. 2006, 11, 345–361. [Google Scholar] [CrossRef]
- Ali, R.F.; Dominic, P.D.D.; Ali, S.E.A.; Rehman, M.; Sohail, A. Information Security Behavior and Information Security Policy Compliance: A Systematic Literature Review for Identifying the Transformation Process from Noncompliance to Compliance. Appl. Sci. 2021, 11, 3383. [Google Scholar] [CrossRef]
- Hevner, A.; Chatterjee, S. Design Science Research in Information Systems; Integrated Series in Information Systems; Management Information Systems Research Center, University of Minnesota: Minneapolis, MN, USA, 2010; pp. 9–22. [Google Scholar] [CrossRef]
- Wieringa, R. Design science as nested problem solving. In Proceedings of the 4th International Conference on Design Science Research in Information Systems and Technology—DESRIST’09, Philadelphia, PA, USA, 7–8 May 2009; ACM Press: New York, NY, USA, 2009. [Google Scholar] [CrossRef]
- Easterbrook, S.; Singer, J.; Storey, M.A.; Damian, D. Selecting Empirical Methods for Software Engineering Research. In Guide to Advanced Empirical Software Engineering; Springer: London, UK, 2008; pp. 285–311. [Google Scholar] [CrossRef]
- Diéguez, M.; Sepúlveda, S.; Cachero, C. UMAM-Q: An instrument to assess the intention to use software development methodologies. In Proceedings of the 7th Iberian Conference on Information Systems and Technologies (CISTI 2012), Madrid, Spain, 20–23 June 2012; pp. 1–6. [Google Scholar]
- Disterer, G. ISO/IEC 27000, 27001 and 27002 for Information Security Management. J. Inf. Secur. 2013, 04, 92–100. [Google Scholar] [CrossRef] [Green Version]
- International Organization for Standardization. ISO/IEC 19011:2018—Guidelines for Auditing Managementsystems. 2018. Available online: https://www.iso.org/obp/ui#iso:std:iso:19011:ed-3:v1:es (accessed on 15 October 2022).
- Diéguez, M.; Bustos, J.; Cares, C. Mapping the variations for implementing information security controls to their operational research solutions. Inf. Syst.-Bus. Manag. 2020, 18, 157–186. [Google Scholar] [CrossRef]
- Bistarelli, S.; Fioravanti, F.; Peretti, P. Using CP-nets As a Guide for Countermeasure Selection. In Proceedings of the 2007 ACM Symposium on Applied Computing, SAC ’07, Seoul, Korea, 11–15 March 2007; ACM: New York, NY, USA, 2007; pp. 300–304. [Google Scholar] [CrossRef]
- Nagata, K.; Amagasa, M.; Kigawa, Y.; Cui, D. Method to Select Effective Risk Mitigation Controls Using Fuzzy Outranking. In Proceedings of the 2009 Ninth International Conference on Intelligent Systems Design and Applications, Pisa, Italy, 30 November–2 December 2009; pp. 479–484. [Google Scholar] [CrossRef]
- Otero, A.R.; Otero, C.E.; Qureshi, A. A Multi-Criteria Evaluation of Information Security Controls Using Boolean Features. Int. J. Netw. Secur. Its Appl. 2010, 2, 1–11. [Google Scholar] [CrossRef]
- Otero, A.R.; Ejnioui, A.; Otero, C.E.; Tejay, G. Evaluation of Information Security Controls in Organizations by Grey Relational Analysis. Int. J. Dependable Trust. Inf. Syst. 2011, 2, 36–54. [Google Scholar] [CrossRef]
- Lv, J.J.; Wang, Y.Z. A Ranking Method for Information Security Risk Management Based on AHP and PROMETHEE. In Proceedings of the 2010 International Conference on Management and Service Science, Wuhan, China, 24–26 August 2010; pp. 1–4. [Google Scholar] [CrossRef]
- Khajouei, H.; Kazemi, M.; Moosavirad, S.H. Ranking information security controls by using fuzzy analytic hierarchy process. Inf. Syst. -Bus. Manag. 2016, 15, 1–19. [Google Scholar] [CrossRef]
- Cabrera, J.S.; Reyes, A.R.L.; Lasco, C.A. Multicriteria Decision Analysis on Information Security Policy: A Prioritization Approach. Adv. Technol. Innov. 2020. [Google Scholar] [CrossRef]
- Tariq, M.I.; Tayyaba, S.; Mian, N.A.; Sarfraz, M.S.; la Hoz-Franco, E.D.; Butt, S.A.; Santarcangelo, V.; Rad, D.V. Combination of AHP and TOPSIS methods for the ranking of information security controls to overcome its obstructions under fuzzy environment. J. Intell. Fuzzy Syst. 2020, 38, 6075–6088. [Google Scholar] [CrossRef]
- Costa, I.; Guarda, T. Information System Security Risk Priority Number: A New Method for Evaluating and Prioritization Security Risk in Information System Applying FMEA. In Proceedings of the International Conference on Information Technology and Applications, Lisbon, Portugal, 20–22 October 2022; Ullah, A., Anwar, S., Rocha, Á., Gill, S., Eds.; Springer: Singapore, 2022; pp. 561–572. [Google Scholar]
- Sawik, T. Selection of optimal countermeasure portfolio in IT security planning. Decis. Support Syst. 2013, 55, 156–164. [Google Scholar] [CrossRef]
- Kawasaki, R.; Hiromatsu, T. Proposal of a model supporting decision-making on information security risk treatment. Int. J. Comput. Electr. Autom. Control. Inf. Eng. 2014, 8, 583–589. [Google Scholar]
- Yevseyeva, I.; Basto-Fernandes, V.; Emmerich, M.; van Moorsel, A. Selecting Optimal Subset of Security Controls. Procedia Comput. Sci. 2015, 64, 1035–1042. [Google Scholar] [CrossRef]
- Shahpasand, M.; Shajari, M.; Golpaygani, S.A.H.; Ghavamipoor, H. A comprehensive security control selection model for inter-dependent organizational assets structure. Inf. Comput. Secur. 2015, 23, 218–242. [Google Scholar] [CrossRef]
- Almeida, L.; Respício, A. Decision support for selecting information security controls. J. Decis. Syst. 2018, 27, 173–180. [Google Scholar] [CrossRef]
- Zhang, H.; Chari, K.; Agrawal, M. Decision support for the optimal allocation of security controls. Decis. Support Syst. 2018, 115, 92–104. [Google Scholar] [CrossRef]
- Ojamaa, A.; Tyugu, E.; Kivimaa, J. Pareto-optimal situaton analysis for selection of security measures. In Proceedings of the MILCOM 2008—2008 IEEE Military Communications Conference, San Diego, CA, USA, 16–19 November 2008; pp. 1–7. [Google Scholar] [CrossRef]
- Yang, Y.P.; Shieh, H.M.; Leu, J.D.; Tzeng, G.H. A VIKOR-based multiple criteria decision method for improving information security risk. Int. J. Inf. Technol. Decis. Mak. 2009, 8, 267–287. [Google Scholar] [CrossRef]
- Chen, L.; Li, L.; Hu, Y.; Lian, K. Information Security Solution Decision-Making Based on Entropy Weight and Gray Situation Decision. In Proceedings of the 2009 Fifth International Conference on Information Assurance and Security, Xi’an, China, 18–20 August 2009. [Google Scholar] [CrossRef]
- Cuihua, X.; Jiajun, L. An Information System Security Evaluation Model Based on AHP and GRAP. In Proceedings of the 2009 International Conference on Web Information Systems and Mining, Shanghai, China, 7–8 November 2009; pp. 493–496. [Google Scholar] [CrossRef]
- Gao, C.; Li, Z.; Song, H. Security Evaluation Method Based on Host Resource Availability. In Proceedings of the 2009 Third International Conference on Multimedia and Ubiquitous Engineering, Qingdao, China, 4–6 June 2009; pp. 499–504. [Google Scholar] [CrossRef]
- Lv, J.J.; Zhou, Y.S.; Wang, Y.Z. A Multi-criteria Evaluation Method of Information Security Controls. In Proceedings of the 2011 Fourth International Joint Conference on Computational Sciences and Optimization, Kunming, China, 15–19 April 2011; pp. 190–194. [Google Scholar] [CrossRef]
- Rees, L.P.; Deane, J.K.; Rakes, T.R.; Baker, W.H. Decision support for Cybersecurity risk planning. Decis. Support Syst. 2011, 51, 493–505. [Google Scholar] [CrossRef]
- Yameng, C.; Yulong, S.; Jianfeng, M.; Xining, C.; Yahui, L. AHP-GRAP Based Security Evaluation Method for MILS System within CC Framework. In Proceedings of the 2011 Seventh International Conference on Computational Intelligence and Security, Sanya, China, 3–4 December 2011; pp. 635–639. [Google Scholar] [CrossRef]
- Kiesling, E.; Strausss, C.; Stummer, C. A Multi-objective Decision Support Framework for Simulation-Based Security Control Selection. In Proceedings of the 2012 Seventh International Conference on Availability, Reliability and Security, Prague, Czech Republic, 20–24 August 2012. [Google Scholar] [CrossRef]
- Viduto, V.; Maple, C.; Huang, W.; López-Peréz, D. A novel risk assessment and optimisation model for a multi-objective network security countermeasure selection problem. Decis. Support Syst. 2012, 53, 599–610. [Google Scholar] [CrossRef] [Green Version]
- Breier, J.; Hudec, L. New approach in information system security evaluation. In Proceedings of the 2012 IEEE First AESS European Conference on Satellite Telecommunications (ESTEL), Rome, Italy, 2–5 October 2012; pp. 1–6. [Google Scholar] [CrossRef]
- Otero, A.R.; Tejay, G.; Otero, L.D.; Ruiz-Torres, A.J. A fuzzy logic-based information security control assessment for organizations. In Proceedings of the 2012 IEEE Conference on Open Systems, Kuala Lumpur, Malaysia, 21–24 October 2012; pp. 1–6. [Google Scholar] [CrossRef]
- Ejnioui, A.; Otero, A.R.; Tejay, G.; Otero, C.; Qureshi, A. A Multi-attribute Evaluation of Information Security Controls in Organizations Using Grey Systems Theory. In Proceedings of the International Conference on Security and Management (SAM), Las Vegas, NV, USA, 16–19 July 2012; pp. 1–7. [Google Scholar]
- Kiesling, E.; Ekelhart, A.; Grill, B.; Strauß, C.; Stummer, C. Simulation-based optimization of IT security controls: Initial experiences with meta-heuristic solution procedures. In Proceedings of the Workshop of the EURO Working Group on Metaheuristics, Hamburg, Germany, 28 February–1 March 2013; pp. 18–20. [Google Scholar]
- Kiesling, E.; Strauss, C.; Ekelhart, A.; Grill, B.; Stummer, C. Simulation-based optimization of information security controls: An adversary-centric approach. In Proceedings of the 2013 Winter Simulations Conference (WSC), Washington, DC, USA, 8–11 December 2013; pp. 2054–2065. [Google Scholar] [CrossRef]
- Breier, J.; Hudec, L. On Selecting Critical Security Controls. In Proceedings of the 2013 International Conference on Availability, Reliability and Security, Regensburg, Germany, 2–6 September 2013; pp. 582–588. [Google Scholar] [CrossRef]
- Breier, J.; Hudec, L. On Identifying Proper Security Mechanisms. In Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2013; pp. 285–294. [Google Scholar] [CrossRef]
- Yang, Y.P.O.; Shieh, H.M.; Tzeng, G.H. A VIKOR technique based on DEMATEL and ANP for information security risk control assessment. Inf. Sci. 2013, 232, 482–500. [Google Scholar] [CrossRef]
- Breier, J. Security evaluation model based on the score of security mechanisms. Inf. Sci. Technol. 2014, 6, 19–27. [Google Scholar]
- Al-Safwani, N.; Hassan, S.; Katuk, N. A multiple attribute decision making for improving information security control assessment. Int. J. Comput. Appl. 2014, 89, 19–24. [Google Scholar] [CrossRef]
- Choo, K.K.; Mubarak, S.; Mani, D. Selection of information security controls based on AHP and GRA. In Proceedings of the Pacific Asia Conference on Information Systems, Chengdu, China, 24–28 June 2014. [Google Scholar]
- Meng, M.; Liu, E. The Application Research of Information Security Risk Assessment Model Based on AHP Method. J. Adv. Inf. Technol. 2015, 201–206. [Google Scholar] [CrossRef]
- Sarala, R.; Zayaraz, G.; Vijayalakshmi, V. Optimal Selection of Security Countermeasures for Effective Information Security. In Proceedings of the International Conference on Soft Computing Systems; Springer: New Delhi, India, 2015; pp. 345–353. [Google Scholar] [CrossRef]
- Ganin, A.A.; Quach, P.; Panwar, M.; Collier, Z.A.; Keisler, J.M.; Marchese, D.; Linkov, I. Multicriteria Decision Framework for Cybersecurity Risk Assessment and Management. Risk Anal. 2017, 40, 183–199. [Google Scholar] [CrossRef]
- Fenz, S.; Neubauer, T. Ontology-based information security compliance determination and control selection on the example of ISO 27002. Inf. Comput. Secur. 2018, 26, 551–567. [Google Scholar] [CrossRef] [Green Version]
- Arogundade, O.T.; Abayomi-Alli, A.; Misra, S. An Ontology-Based Security Risk Management Model for Information Systems. Arab. J. Sci. Eng. 2020, 45, 6183–6198. [Google Scholar] [CrossRef]
- Alenezi, M.; Nadeem, M.; Agrawal, A.; Kumar, R.; Khan, R. Fuzzy Multi Criteria Decision Analysis Method for Assessing Security Design Tactics for Web Applications. Int. J. Intell. Eng. Syst. 2020, 13, 181–196. [Google Scholar] [CrossRef]
- Razikin, K.; Soewito, B. Cybersecurity decision support model to designing information technology security system based on risk analysis and cybersecurity framework. Egypt. Inform. J. 2022, 23, 383–404. [Google Scholar] [CrossRef]
- Gass, S.I.; Saaty, T.L. Parametric Objective Function (Part 2)—Generalization. J. Oper. Res. Soc. Am. 1955, 3, 395–401. [Google Scholar] [CrossRef]
- Wierzbicki, A.P. The Use of Reference Objectives in Multiobjective Optimization. In Lecture Notes in Economics and Mathematical Systems; Springer: Berlin/Heidelberg, Germany, 1980; pp. 468–486. [Google Scholar] [CrossRef]
- Cheng, T.; Ng, C.; Yuan, J.; Liu, Z. Single machine scheduling to minimize total weighted tardiness. Eur. J. Oper. Res. 2005, 165, 423–443. [Google Scholar] [CrossRef]
- Koulamas, C. The single-machine total tardiness scheduling problem: Review and extensions. Eur. J. Oper. Res. 2010, 202, 1–7. [Google Scholar] [CrossRef]
- Edis, E.B.; Oguz, C.; Ozkarahan, I. Parallel machine scheduling with additional resources: Notation, classification, models and solution methods. Eur. J. Oper. Res. 2013, 230, 449–463. [Google Scholar] [CrossRef]
- Wäscher, G.; Haußner, H.; Schumann, H. An improved typology of cutting and packing problems. Eur. J. Oper. Res. 2007, 183, 1109–1130. [Google Scholar] [CrossRef]
- Egeblad, J.; Pisinger, D. Heuristic approaches for the two- and three-dimensional knapsack packing problem. Comput. Oper. Res. 2009, 36, 1026–1049. [Google Scholar] [CrossRef]
- Florios, K.; Mavrotas, G.; Diakoulaki, D. Solving multiobjective, multiconstraint knapsack problems using mathematical programming and evolutionary algorithms. Eur. J. Oper. Res. 2010, 203, 14–21. [Google Scholar] [CrossRef]
- Ghasemi, T.; Razzazi, M. Development of core to solve the multidimensional multiple-choice knapsack problem. Comput. Ind. Eng. 2011, 60, 349–360. [Google Scholar] [CrossRef]
- Wang, L.; Wang, S.Y.; Xu, Y. An effective hybrid EDA-based algorithm for solving multidimensional knapsack problem. Expert Syst. Appl. 2012, 39, 5593–5599. [Google Scholar] [CrossRef]
- Hartmann, S.; Briskorn, D. A survey of variants and extensions of the resource-constrained project scheduling problem. Eur. J. Oper. Res. 2010, 207, 1–14. [Google Scholar] [CrossRef] [Green Version]
- Tasan, S.O.; Gen, M. An integrated selection and scheduling for disjunctive network problems. Comput. Ind. Eng. 2013, 65, 65–76. [Google Scholar] [CrossRef]
- Samphaiboon, N.; Yamada, Y. Heuristic and Exact Algorithms for the Precedence-Constrained Knapsack Problem. J. Optim. Theory Appl. 2000, 105, 659–676. [Google Scholar] [CrossRef]
- Samavati, M.; Essam, D.; Nehring, M.; Sarker, R. A methodology for the large-scale multi-period precedence-constrained knapsack problem: An application in the mining industry. Int. J. Prod. Econ. 2017, 193, 12–20. [Google Scholar] [CrossRef]
- Espinoza, D.; Goycoolea, M.; Moreno, E. The precedence constrained knapsack problem: Separating maximally violated inequalities. Discret. Appl. Math. 2015, 194, 65–80. [Google Scholar] [CrossRef]
- Hoogeveen, H. Multicriteria scheduling. Eur. J. Oper. Res. 2005, 167, 592–623. [Google Scholar] [CrossRef]
- Mauergauz, Y. Multi-criteria Models and Decision-Making. In Advanced Planning and Scheduling in Manufacturing and Supply Chains; Springer International Publishing: Berlin/Heidelberg, Germany, 2016; pp. 127–162. [Google Scholar] [CrossRef]
- International Organization for Standardization. ISO/IEC 27002:2013—Information Technology—Security Techniques—Code of Practice for Information Security Controls. 2013. Available online: http://www.iso.org/iso/catalogue_detail?csnumber=54533 (accessed on 15 October 2022).
- gams Development Corporation. General Algebraic Modeling System. 2017. Available online: http://www.gams.com/ (accessed on 15 October 2022).
- Wisconsin Institutes for Discovery. NEOS Server for Optimization Web Portal. Available online: http://www.neos-server.org/neos/ (accessed on 15 October 2022).
- Gobierno de Chile. Decreto 83: Norma técnica para los órganos de la administración del estado sobre seguridad y confidencialidad de los documentos electrónicos. Available online: http://www.leychile.cl/Navegar?idNorma=234598 (accessed on 15 October 2022).
- Gobierno de Chile. Programa de mejoramiento de la gestión sistema de seguridad de la información: Versión 2011. Available online: http://www.dipres.gob.cl/594/w3-propertyvalue-16887.html (accessed on 15 October 2022).
Category | Solution Type | |
---|---|---|
Quantitative Solutions | Qualitative Solutions | |
Prioritization | 9 papers—[32,33,34,35,36,37,38,39,40] | |
Selection | 6 papers—[41,42,43,44,45,46] | 28 papers—[47,48,49,50,51,52,53,54,55,56,57,58,59,60,61,62,63,64,65,66,67,68,69,70,71,72,73,74] |
Programming |
Category | Situation | OR Method | Priorization | Sequence | Selection | Programming | Objective Function | Nesting |
---|---|---|---|---|---|---|---|---|
Prioritization | Multidimensional ranking of controls | [75,76] | ✓ | |||||
Sequencing of independent controls | [77,78,79] | ✓ | Single | |||||
Selection | Selection of controls with restrictions | [80,81,82,83,84] | ✓ | Single | ||||
Selection of controls with restrictions and dependencies between controls | [80,81,82,83,84] | ✓ | Single | ✓ | ||||
Programming | Dimension sequencing and control programming with nesting | [85,86] | ✓ | ✓ | ✓ | Single | ✓ | |
Selection and programming of controls considering nesting | [82,87,88,89,90] | ✓ | ✓ | Single | ✓ | |||
Multi-criteria programming of constrained controls | [82,90,91] | ✓ | ✓ | Multi | ✓ |
Spreadsheets with associated Solver | |
---|---|
All mathematical formulations that can be solved through the properties of a spreadsheet program are considered. In general, they are applied to solve simple problems which do not require very complex modeling, such as linear programming problems. | Solver MsExcel |
Mathematical and symbolic calculation environments | |
Applications dedicated to solving mathematical problems that include their Solver. These programs can solve more complex optimization problems since they have functionalities dedicated to these types of problems. | MatLab Maple Mathematica NEOS-SERVER |
Algebraic modeling languages | |
This type of language and associated tools have specific capabilities for resolving this problem. The syntax allows building a model very close to the mathematical expression that represents the situation. | GAMS AMPL AIMMS XPRESS-MP |
Items | MASISCo | Literature Proposals | Security Standards |
---|---|---|---|
Formalizes recommendation process | Yes | No | No |
Incorporates optimization methods | Yes | some | No |
Considers nesting controls | Yes | No | No |
Proposes Software tool | Yes | No | No |
Proposes solutions for: | |||
- Control prioritization | Yes | Some | No |
- Control selection | Yes | Some | No |
- Implementation Programming | Yes | No | No |
Usefulness | Mean | 77. 8 | |
95% Confidence interval for the mean | Lower limit | 69.31 | |
Upper limit | 84.86 | ||
Median | 78.50 | ||
Minimum | 56 | ||
Maximum | 94 | ||
Ease of use | Mean | 65.42 | |
95% Confidence interval for the mean | Lower limit | 56.49 | |
Upper limit | 74.45 | ||
Median | 60.50 | ||
Minimum | 47 | ||
Maximum | 91 | ||
Compatibility | Mean | 68.92 | |
95% Confidence interval for the mean | Lower limit | 57.02 | |
Upper limit | 80.81 | ||
Median | 71.50 | ||
Minimum | 34 | ||
Maximum | 91 | ||
Subjective Norm | Mean | 58.67 | |
95% Confidence interval for the mean | Lower limit | 50.15 | |
Upper limit | 67.18 | ||
Median | 57.50 | ||
Minimum | 35 | ||
Maximum | 83 | ||
Intention to Adopt | Mean | 34.67 | |
95% Confidence interval for the mean | Lower limit | 29.05 | |
Upper limit | 40.28 | ||
Median | 35.00 | ||
Minimum | 17 | ||
Maximum | 49 |
Dimension | Answers | Percentages |
---|---|---|
U | 10 | 47.6% |
EU | 3 | 14.3% |
C | 8 | 38.1% |
NS | 0 | 0% |
Dimension | Answers | Percentages |
---|---|---|
U | 3 | 18.75% |
EU | 12 | 75% |
C | 1 | 6.25% |
NS | 0 | 0% |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Diéguez, M.; Cares, C.; Cachero, C.; Hochstetter, J. MASISCo—Methodological Approach for the Selection of Information Security Controls. Appl. Sci. 2023, 13, 1094. https://doi.org/10.3390/app13021094
Diéguez M, Cares C, Cachero C, Hochstetter J. MASISCo—Methodological Approach for the Selection of Information Security Controls. Applied Sciences. 2023; 13(2):1094. https://doi.org/10.3390/app13021094
Chicago/Turabian StyleDiéguez, Mauricio, Carlos Cares, Cristina Cachero, and Jorge Hochstetter. 2023. "MASISCo—Methodological Approach for the Selection of Information Security Controls" Applied Sciences 13, no. 2: 1094. https://doi.org/10.3390/app13021094
APA StyleDiéguez, M., Cares, C., Cachero, C., & Hochstetter, J. (2023). MASISCo—Methodological Approach for the Selection of Information Security Controls. Applied Sciences, 13(2), 1094. https://doi.org/10.3390/app13021094