loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Lamine Aouad 1 and Muhammad Rizwan Asghar 2

Affiliations: 1 Tenable Network Security, U.S.A. ; 2 The University of Auckland, New Zealand

Keyword(s): Cyber Exposure, Vulnerability Management, Ontology, Cyber Risk.

Abstract: A major gap in cybersecurity studies, especially as it relates to cyber risk, is the lack of comprehensive formal knowledge representation, and often a limited view, mainly based on abstract security concepts with limited context. Additionally, much of the focus is on the attack and the attacker, and a more complete view of risk assessment has been inhibited by the lack of knowledge from the defender landscape, especially in the matter of the impact and performance of compensating controls. In this study, we will start by defining a conceptual ontology that integrates concepts that model all of cybersecurity entities. We will then present an adaptive risk reasoning approach with a particular focus on defender activities. The main purpose is to provide a more complete view, from the defender perspective, that bridges the gap between risk assessment theories and practical cybersecurity operations in real-world deployments.

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.144.140.151

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Aouad, L. and Asghar, M. (2020). Defender-centric Conceptual Cyber Exposure Ontology for Adaptive Cyber Risk Assessment. In Proceedings of the 17th International Joint Conference on e-Business and Telecommunications - SECRYPT; ISBN 978-989-758-446-6; ISSN 2184-7711, SciTePress, pages 580-586. DOI: 10.5220/0009826205800586

@conference{secrypt20,
author={Lamine Aouad. and Muhammad Rizwan Asghar.},
title={Defender-centric Conceptual Cyber Exposure Ontology for Adaptive Cyber Risk Assessment},
booktitle={Proceedings of the 17th International Joint Conference on e-Business and Telecommunications - SECRYPT},
year={2020},
pages={580-586},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0009826205800586},
isbn={978-989-758-446-6},
issn={2184-7711},
}

TY - CONF

JO - Proceedings of the 17th International Joint Conference on e-Business and Telecommunications - SECRYPT
TI - Defender-centric Conceptual Cyber Exposure Ontology for Adaptive Cyber Risk Assessment
SN - 978-989-758-446-6
IS - 2184-7711
AU - Aouad, L.
AU - Asghar, M.
PY - 2020
SP - 580
EP - 586
DO - 10.5220/0009826205800586
PB - SciTePress