Risk Assessment Graphs: Utilizing Attack Graphs for Risk Assessment

07/26/2023
by   Simon Unger, et al.
0

Risk assessment plays a crucial role in ensuring the security and resilience of modern computer systems. Existing methods for conducting risk assessments often suffer from tedious and time-consuming processes, making it challenging to maintain a comprehensive overview of potential security issues. In this paper, we propose a novel approach that leverages attack graphs to enhance the efficiency and effectiveness of risk assessment. Attack graphs visually represent the various attack paths that adversaries can exploit within a system, enabling a systematic exploration of potential vulnerabilities. By extending attack graphs with capabilities to include countermeasures and consequences, they can be leveraged to constitute the complete risk assessment process. Our method offers a more streamlined and comprehensive analysis of system vulnerabilities, where system changes, or environment changes can easily be adapted and the issues exposing the highest risk can easily be identified. We demonstrate the effectiveness of our approach through a case study, as well as the applicability by combining existing risk assessment standards with our method. Our work aims to bridge the gap between risk assessment practices and evolving threat landscapes, offering an improved methodology for managing and mitigating risks in modern computer systems.

READ FULL TEXT

page 1

page 3

page 4

page 5

page 6

page 16

research
12/11/2018

Information Security Risks Assessment: A Case Study

Owing to recorded incidents of Information technology inclined organisat...
research
06/26/2019

Heuristic Approach Towards Countermeasure Selection using Attack Graphs

Selecting the optimal set of countermeasures is a challenging task that ...
research
06/07/2023

A GDPR-compliant Risk Management Approach based on Threat Modelling and ISO 27005

Computer systems process, store and transfer sensitive information which...
research
09/02/2019

Defining and Adopting an End User Computing Policy: A Case Study

End User Computing carries significant risks if not well controlled. Thi...
research
11/29/2018

Security, Privacy and Safety Risk Assessment for Virtual Reality Learning Environment Applications

Social Virtual Reality based Learning Environments (VRLEs) such as vSoci...
research
05/14/2021

On the Soundness of Infrastructure Adversaries

Companies and network operators perform risk assessment to inform policy...
research
01/18/2023

Graph-Theoretic Approach for Manufacturing Cybersecurity Risk Modeling and Assessment

Identifying, analyzing, and evaluating cybersecurity risks are essential...

Please sign up or login with your details

Forgot password? Click here to reset