Skip to main content

Importance-Performance Analysis Based Evaluation Method for Security Incident Management Capability

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 10192))

Abstract

SEI’s Incident Management Capability Metrics provides an overview of how the metrics can be used to evaluate and improve organizations’ information security incident management capability. However, there still exist several deficiencies when using SEI’s Metrics to measure the function areas of security incident management capability. An importance-performance analysis based evaluation method for measuring and improving organizations’ information security incident management capability was proposed in this paper. The evaluation method produces a four-quadrant IPA matrix that considers both importance and performance simultaneously for better identifying function areas needing improvement. A numerical example of the evaluation method showed that the proposed method is efficient for deploying continuous improvement program and better allocating limited resources.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Martilla, J.A., James, J.C.: Importance-performance analysis. J. Mark. 41(1), 77–79 (1997)

    Article  Google Scholar 

  2. Crompton, J.L., Duray, N.A.: An investigation of the relative efficacy of four alternative approaches to importance-performance analysis. J. Acad. Mark. Sci. 13(4), 69–80 (1985)

    Article  Google Scholar 

  3. Shia, B.C., Chen, M., Ramdansyah, A.D.: Measuring customer satisfaction toward localization website by WebQual and importance performance analysis (case study on AliexPress site in Indonesia). Am. J. Ind. Bus. Manag. 6(2), 117–128 (2016)

    Google Scholar 

  4. Office of Government Commerce (OGC): ITIL V3-Service Design Book, The Stationery Office, UK (2007)

    Google Scholar 

  5. Howard, J.D., Longstaff, T.A.: A Common Language for Computer Security Incidents, SANDIA REPORT, SAND98-8667, Sandia National Laboratories, CA, USA, October 1998

    Google Scholar 

  6. Sahibudin, S., Sharifi, M., Ayat, M.: Combining ITIL, COBIT and ISO/IEC 27002 in order to design a comprehensive IT framework in organizations. In: Proceedings of the 2nd Asia International Conference on Modelling & Simulation (2008)

    Google Scholar 

  7. Alberts, C., Dorofee, A., Killcrece, G., Ruefle, R., Zajicek, M.: Defining incident management processes for CSIRTs: a work in progress, Technical report CMU/SEI-2004-TR-015, ADA453378, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA, USA (2004)

    Google Scholar 

  8. Alberts, C.J., Dorofee, A.J., Ruefle, R., Zajicek, M.: An introduction to the mission risk diagnostic for incident management capabilities (MRD-IMC), Technical report CMU/SEI-2014-TN-005, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA, USA, May 2014

    Google Scholar 

  9. West-Brown, M.J., Stikvoort, D., Kossakowski, K.P., Killcrece, G., Ruefle, R., Zajicek, M.: Handbook for computer security incident response teams (CSIRTs), CMU/SEI-2003-HB-002, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA, USA (2003)

    Google Scholar 

  10. Dorofee, A., Killcrece, G., Ruefle, R., Zajicek, M.: Incident management capability metrics, version 0.1, Technical report CMU/SEI-2007-TR-008, ESC-TR-2007–008, CERT Program, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA, USA, April 2007

    Google Scholar 

  11. ISO/IEC 13335-1: Information technology—Security techniques - Management of information and communications technology security - Part 1: Concepts and models for information and communications technology security management (2004)

    Google Scholar 

  12. ISO/IEC TR 18044: Information technology—Security techniques—Information security incident management, International Organization for Standardization/International Electrotechnical Commission (2004)

    Google Scholar 

  13. ISO/IEC 27001:2013(E): Information technology–Security techniques–Information security management systems–Requirements, International Organization for Standardization/International Electrotechnical Commission (2013)

    Google Scholar 

  14. ISO/IEC 27002: Information Technology—Security Techniques—Code of Practice for Information Security Management, International Organization for Standardization/International Electrotechnical Commission (2013)

    Google Scholar 

  15. ISO/IEC 27035: Information Technology—Security Techniques—Information Security Incident Management, International Organization for Standardization/International Electrotechnical Commission (2011)

    Google Scholar 

  16. NIST SP 800-61 Revision 2: Computer Security Incident Handling Guide, National Institute of Standards and Technology, U.S. Department of Commerce, August 2012

    Google Scholar 

  17. ISO/IEC JTC 1 SC27: IT Security techniques, International Organization for Standardization/International Electrotechnical Commission (2015)

    Google Scholar 

  18. Killcrece, G., Kossakowski, K.P., Ruefle, R., Zajicek, M.: Organizational models for computer security incident response teams (CSIRTs), Technical report CMU/SEI-2003-HB-001, ADA421684, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA, USA (2003)

    Google Scholar 

  19. Killcrece, G., Kossakowski, K.P., Ruefle, R., Zajicek, M.: State of the practice of computer security incident response teams (CSIRTs), Technical report CMU/SEI-2003-TR-001, ESC-TR-2003-001, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA, USA, October 2003

    Google Scholar 

  20. Zadeh, L.A.: Fuzzy sets. Inf. Control 8, 338–356 (1965)

    Article  MathSciNet  MATH  Google Scholar 

  21. Zadeh, L.A.: The concept of a linguistic variable and its application to approximate reasoning. Part I. Inf. Sci. 8, 199–249 (1975). Part II. 8, 301–357, Part III. 9, 4301–4308

    MathSciNet  MATH  Google Scholar 

  22. Chen, S.H., Hsieh, C.H.: Graded mean integration representation of generalized fuzzy number. J. Chin. Fuzzy Syst. 5(2), 1–7 (1999)

    Google Scholar 

  23. Lin, K.S.: Fuzzy similarity matching method for interior design drawing recommendation. Rev. Socionetwork Strat. 10(1), 17–32 (2016)

    Article  Google Scholar 

  24. Lin, K.S., Chiu, C.C.: A fuzzy similarity matching model for interior design drawing recommendation. In: Proceedings of the ASE BigData 2015 & SocialInformatics (2015)

    Google Scholar 

  25. Gacto, M.J., Alcalá, R., Herrera, F.: Interpretability of linguistic fuzzy rule-based systems: an overview of interpretability measures. Inf. Sci. 181, 4340–4360 (2011)

    Article  Google Scholar 

  26. Chang, C.H., Wu, Y.C.: The genetic algorithm based tuning method for symmetric membership functions of fuzzy logic control systems. In: Proceedings of the IEEE Conference on Industrial Automation and Control: Emerging Technologies, pp. 421–428, May 1995

    Google Scholar 

  27. Nachtmann, H., Needy, K.L.: Fuzzy activity based costing: a methodology for handling uncertainty in activity based costing systems. Eng. Econ. 46(4), 245–273 (2001)

    Article  Google Scholar 

  28. Chen, T.Y., Ku, T.C.: Importance-assessing method with fuzzy number-valued fuzzy measures and discussions on TFNs And TrFNs. Int. J. Fuzzy Syst. 10(2), 92–103 (2008)

    MathSciNet  Google Scholar 

  29. Chen, M.S., Wang, S.W.: Fuzzy clustering analysis for optimizing fuzzy membership functions. Fuzzy Sets Syst. 103, 239–254 (1999)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chih-Chung Chiu .

Editor information

Editors and Affiliations

Appendix

Appendix

The incident management function areas and evaluation ratings

 

Graded mean of performance ratings

Graded mean of importance weightings

Interfaces

0.1.1 Have well-defined, formal interfaces for conducting agency incident management activities been established and maintained?

0.47

0.78

Risk assessment support:

1.1.1 Are Risk Assessments (RAs) performed on constituent systems?

0.52

0.78

1.1.2 Are the constituents assisted with correcting problems identified by Risk Assessment (RA) activities?

0.56

0.48

1.1.3 Is proactive vulnerability scanning (VS) performed on constituent networks and systems?

0.56

0.41

1.1.4 Is the constituent assisted with correcting problems identified by vulnerability scanning (VS) activities?

0.53

0.41

1.1.5 Is trend analysis supported and conducted?

0.32

0.78

Malware protection support:

1.2.1 Is there an institutionalized Malware/Anti-Virus (AV) Program?

0.57

0.78

Computer network defense operational exercises:

  

1.3.1 Are operational exercises conducted to assess the security posture of the organization?

0.58

0.43

1.3.2 Are lessons learned from operational exercises incorporated into the constituents’ network defenses?

0.74

0.33

Constituent protection support and training:

\( \vdots \)

Respond

Incident reporting:

3.1.1 Are incidents reported to and coordinated with appropriate external organizations or groups in accordance with organizational guidelines?

0.32

0.47

3.1.2 Are incidents reported to appropriate organization management in accordance with organizational guidelines?

0.37

0. 47

Incident response:

3.2.1 Is there an event/incident handling capability?

0.32

0.78

3.2.2 Is there an operations log or record of daily operational activity?

0.37

0.78

3.2.3 Is information on all events/incidents collected and retained in support of future analytical efforts and situational awareness?

0.36

0.78

\( \vdots \)

  

4.7.2 Is the constituency assisted with decisions regarding changes to local threat levels?

0.46

0.68

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Chiu, CC., Lin, KS. (2017). Importance-Performance Analysis Based Evaluation Method for Security Incident Management Capability. In: Nguyen, N., Tojo, S., Nguyen, L., Trawiński, B. (eds) Intelligent Information and Database Systems. ACIIDS 2017. Lecture Notes in Computer Science(), vol 10192. Springer, Cham. https://doi.org/10.1007/978-3-319-54430-4_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-54430-4_18

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-54429-8

  • Online ISBN: 978-3-319-54430-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics