One of the big problems of risk assessment in information security is the quantification of risk-related properties, such as vulnerability. Vulnerability expresses the likelihood that a threat agent acting against an asset will cause impact, for example, the likelihood that an attacker will be able to crack a password or break into a system. This likelihood depends on the capabilities of the threat agent and the strength of the controls in place. In this paper, we provide a framework for estimating these three variables based on the Elo rating used for chess players. This framework re-interprets security from the field of Item Response Theory. By observing the success of threat agents against assets, one can rate the strength of threats and controls, and predict the vulnerability of systems to particular threats. The application of Item Response Theory to the field of risk is new, but analogous to its application to children solving math problems. It provides an innovative and sound way to quantify vulnerability in models of (information) security.
|Title of host publication||Proceedings of the 2012 workshop on New security paradigms|
|Publisher||Association for Computing Machinery|
|Publication status||Published - 2012|
|Event||New Security Paradigms Workshop (NSPW 2012) - Bertinoro, Italy|
Duration: 19 Sep 2012 → 21 Sep 2012
|Workshop||New Security Paradigms Workshop (NSPW 2012)|
|Period||19/09/2012 → 21/09/2012|