Reducing Threats by Using Bayesian Networks to Prioritize and Combine Defense in Depth Security Measures
Open Access
- 1 January 2020
- journal article
- research article
- Published by Scientific Research Publishing, Inc. in Journal of Information Security
- Vol. 11 (03), 121-137
- https://doi.org/10.4236/jis.2020.113008
Abstract
Studied in this article is whether the Bayesian Network Model (BNM) can be effectively applied to the prioritization of defense in-depth security tools and procedures and to the combining of those measures to reduce cyber threats. The methods used in this study consisted of scanning 24 peer reviewed Cybersecurity Articles from prominent Cybersecurity Journals using the Likert Scale Model for the article’s list of defense in depth measures (tools and procedures) and the threats that those measures were designed to reduce. The defense in depth tools and procedures are then compared to see whether the Likert scale and the Bayesian Network Model could be effectively applied to prioritize and combine the measures to reduce cyber threats attacks against organizational and private computing systems. The findings of the research reject the H0 null hypothesis that BNM does not affect the relationship between the prioritization and combining of 24 Cybersecurity Article’s defense in depth tools and procedures (independent variables) and cyber threats (dependent variables).Keywords
This publication has 13 references indexed in Scilit:
- Performance Gaps and Managerial Decisions: A Bayesian Decision Theory of Managerial ActionJournal of Public Administration Research and Theory, 2015
- A Study on Advanced Persistent ThreatsLecture Notes in Computer Science, 2014
- Network Defense Methodology: A Comparison of Defense in Depth and Defense in BreadthJournal of Information Security, 2013
- Advancing the defense in depth modelPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2012
- Security Best Practices: Applying Defense-in-Depth Strategy to Protect the NGI_PLLecture Notes in Computer Science, 2012
- Probabilistic Inference and Influence DiagramsOperations Research, 1988
- Evaluating Influence DiagramsOperations Research, 1986
- Bayesian Methods: General BackgroundPublished by Cambridge University Press (CUP) ,1986
- An Application of Bayesian Decision Theory to Decentralized Control of Job SchedulingInternational Conference on Acoustics, Speech, and Signal Processing (ICASSP), 1985
- Probability, Frequency and Reasonable ExpectationAmerican Journal of Physics, 1946