Abstract
Threat analysis and mitigation, both essential for corporate security, are time consuming, complex and demand expert knowledge. We present an approach for simulating threats to corporate assets, taking the entire infrastructure into account. Using this approach effective countermeasures and their costs can be calculated quickly without expert knowledge and a subsequent security decisions will be based on objective criteria. The ontology used for the simulation is based on Landwehr’s [ALRL04] taxonomy of computer security and dependability.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Avizienis, A., Laprie, J.-C., Randell, B., Landwehr, C.E.: Basic concepts and taxonomy of dependable and secure computing. IEEE Trans. Dependable Sec. Comput. 1(1), 11–33 (2004)
It-grundschutzhandbuch (2004), http://www.bsi.de/gshb/deutsch/download/GSHB2004.pdf
Cobit (2006), http://www.isaca.org/
Donner, M.: Toward a security ontology. IEEE Security and Privacy 1(3), 6–7 (2003)
eclass (2006), http://www.eclass.de/
Gómez-Pérez, A., Fernández-López, M., Corcho, O.: Ontological Engineering, 1st edn. Springer, London (2004)
Iso17799 (2006), http://www.iso.org/
Landwehr, C.E., Bull, A.R., McDermott, J.P., Choi, W.S.: A taxonomy of computer program security flaws. ACM Comput. Surv. 26(3), 211–254 (1994)
Owl web ontology language (2004), http://www.w3.org/TR/owl-features/
The protege ontology editor and knowledge acquisition system (2005), http://protege.stanford.edu/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ekelhart, A., Fenz, S., Klemen, M.D., Weippl, E.R. (2006). Security Ontology: Simulating Threats to Corporate Assets. In: Bagchi, A., Atluri, V. (eds) Information Systems Security. ICISS 2006. Lecture Notes in Computer Science, vol 4332. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11961635_17
Download citation
DOI: https://doi.org/10.1007/11961635_17
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-68962-1
Online ISBN: 978-3-540-68963-8
eBook Packages: Computer ScienceComputer Science (R0)