On Identifying Proper Security Mechanisms - Information and Communication Technology Access content directly
Conference Papers Year : 2013

On Identifying Proper Security Mechanisms

Jakub Breier
  • Function : Author
  • PersonId : 1003075
Ladislav Hudec
  • Function : Author
  • PersonId : 1003076


Selection of proper security mechanisms that will protect the organization’s assets against cyber threats is an important non-trivial problem. This paper introduces the approach based on statistical methods that will help to choose the proper controls with respect to actual security threats. First, we determine security mechanisms that support control objectives from ISO/IEC 27002 standard and assign them meaningful weights. Then we employ a factor analysis to reveal dependencies among control objectives. Then this knowledge can be reflected to security mechanisms, that inherit these dependencies from control objectives.
Fichier principal
Vignette du fichier
978-3-642-36818-9_29_Chapter.pdf (232.77 Ko) Télécharger le fichier
Origin : Files produced by the author(s)

Dates and versions

hal-01480182 , version 1 (01-03-2017)





Jakub Breier, Ladislav Hudec. On Identifying Proper Security Mechanisms. 1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.285-294, ⟨10.1007/978-3-642-36818-9_29⟩. ⟨hal-01480182⟩
113 View
122 Download



Gmail Facebook X LinkedIn More