A knowledge base for justified information security decision-making

  • Daria Stepanova*
  • , Simon E. Parkin
  • , Aad Van Moorsel
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

The majority of modern-day companies store commercially sensitive and valuable information assets in digital form. It is essential for the Chief Information Security Officer (CISO) within an organisation to ensure that such information is adequately protected. External standards exist to advise CISOs on how to secure information, but these are essentially "one-size-fits- all". Furthermore they do not consider the human-behavioural aspects that determine the impact of security controls upon employees, or how security controls can be best deployed to manage insecure employee behaviour. CISOs require more information than they are currently provided with to justify their information security management decisions. Here we present a knowledge base and accompanying user interface. The knowledge base represents key structural components of the ISO27002 security standard, formally relating them to one another. This empowers CISOs to understand how different security measures impact upon each other. It also considers how human-behavioural factors can be associated with these concepts. The accompanying user interface provides a means to present formalised information security concepts to CISOs. This paper describes the development of the knowledge base and user interface, highlighting and discussing key challenges and how they were resolved.

Original languageEnglish
Title of host publicationICSOFT 2009 - 4th International Conference on Software and Data Technologies, Proceedings
Pages326-331
Number of pages6
Publication statusPublished - 2009
EventICSOFT 2009 - 4th International Conference on Software and Data Technologies - Sofia, Bulgaria
Duration: 26 Jul 200929 Jul 2009

Publication series

NameICSOFT 2009 - 4th International Conference on Software and Data Technologies, Proceedings
Volume2

Conference

ConferenceICSOFT 2009 - 4th International Conference on Software and Data Technologies
Country/TerritoryBulgaria
CitySofia
Period26/07/0929/07/09

Keywords

  • Human-behavioural factors
  • Information security
  • Knowledge base
  • Ontology

ASJC Scopus subject areas

  • Computer Science Applications
  • Software

Fingerprint

Dive into the research topics of 'A knowledge base for justified information security decision-making'. Together they form a unique fingerprint.

Cite this