scispace - formally typeset
Search or ask a question
Topic

Operations security

About: Operations security is a research topic. Over the lifetime, 396 publications have been published within this topic receiving 3368 citations. The topic is also known as: OPSEC & operational security.


Papers
More filters
Journal ArticleDOI
TL;DR: Quantitative measures that estimate the effort an attacker might expend to exploit these vulnerabilities to defeat the system security objectives are proposed and a set of tools has been developed to compute such measures and used in an experiment to monitor a large real system for nearly two years.
Abstract: This paper presents the results of an experiment in security evaluation. The system is modeled as a privilege graph that exhibits its security vulnerabilities. Quantitative measures that estimate the effort an attacker might expend to exploit these vulnerabilities to defeat the system security objectives are proposed. A set of tools has been developed to compute such measures and has been used in an experiment to monitor a large real system for nearly two years. The experimental results are presented and the validity of the measures is discussed. Finally, the practical usefulness of such tools for operational security monitoring is shown and a comparison with other existing approaches is given.

409 citations

Journal ArticleDOI
TL;DR: The collected data indicates that the breaches during the standard attack phase are statistically equivalent and that the times between breaches are exponentially distributed, which would actually imply that traditional methods for reliability modeling could be applicable.
Abstract: The paper is based on a conceptual framework in which security can be split into two generic types of characteristics, behavioral and preventive. Here, preventive security denotes the system's ability to protect itself from external attacks. One way to describe the preventive security of a system is in terms of its interaction with the alleged attacker, i.e., by describing the intrusion process. To our knowledge, very little is done to model this process in quantitative terms. Therefore, based on empirical data collected from intrusion experiments, we have worked out a hypothesis on typical attacker behavior. The hypothesis suggests that the attacking process can be split into three phases: the learning phase, the standard attack phase, and the innovative attack phase. The probability for successful attacks during the learning and innovative phases is expected to be small, although for different reasons. During the standard attack phase it is expected to be considerably higher. The collected data indicates that the breaches during the standard attack phase are statistically equivalent and that the times between breaches are exponentially distributed. This would actually imply that traditional methods for reliability modeling could be applicable.

293 citations

Journal ArticleDOI
TL;DR: In this article, an online voltage security assessment scheme using synchronized phasor measurements and periodically updated decision trees (DTs) is presented. But the DTs are first trained offline using detailed voltage security analysis conducted using the past representative and forecasted 24-h ahead operating conditions.
Abstract: Voltage collapse is a critical problem that impacts power system operational security. Timely and accurate assessment of voltage security is necessary to detect post-contingency voltage problems in order to prevent a large scale blackout. This paper presents an online voltage security assessment scheme using synchronized phasor measurements and periodically updated decision trees (DTs). The DTs are first trained offline using detailed voltage security analysis conducted using the past representative and forecasted 24-h ahead operating conditions. The DTs are also updated every hour by including newly predicted system conditions for robustness improvement. The associated synchronized critical attributes are obtained in real time from phasor measurement units (PMUs) and compared with the offline thresholds determined by the DTs to assess security. This approach is tested on the American Electric Power (AEP) system and properly trained DTs perform well in assessing voltage security. Several new ideas to improve DT performance are also introduced.

252 citations

Proceedings ArticleDOI
08 Sep 2009
TL;DR: This paper critically surveys previous work on quantitative representation and analysis of security with respect to security perspective, target of quantification, underlying assumptions and type of validation.
Abstract: This paper critically surveys previous work on quantitative representation and analysis of security. Such quantified security has been presented as a general approach to precisely assess and control security. We classify a significant part of the work between 1981 and 2008 with respect to security perspective, target of quantification, underlying assumptions and type of validation. The result shows how the validity of most methods is still strikingly unclear. Despite applying a number of techniques from fields such as computer science, economics and reliability theory to the problem it is unclear what valid results exist with respect to operational security. Quantified security is thus a weak hypothesis because a lack of validation and comparison between such methods against empirical data. Furthermore, many assumptions in formal treatments are not empirically well-supported in operational security and have been adopted from other fields. A number of risks are present with depending on quantitative methods with limited or no validation.

193 citations

BookDOI
22 Jan 2007
TL;DR: The Complete Guide to Security and Privacy Metrics: Measuring Regulatory Compliance, Operational Resilience, and ROI defines more than 900 ready to use metrics that measure compliance, resiliency, and return on investment.
Abstract: While it has become increasingly apparent that individuals and organizations need a security metrics program, it has been exceedingly difficult to define exactly what that means in a given situation. There are hundreds of metrics to choose from and an organizations mission, industry, and size will affect the nature and scope of the task as well as the metrics and combinations of metrics appropriate to accomplish it. Finding the correct formula for a specific scenario calls for a clear concise guide with which to navigate this sea of information. Complete Guide to Security and Privacy Metrics: Measuring Regulatory Compliance, Operational Resilience, and ROI defines more than 900 ready to use metrics that measure compliance, resiliency, and return on investment. The author explains what needs to be measured, why and how to measure it, and how to tie security and privacy metrics to business goals and objectives. The book addresses measuring compliance with current legislation, regulations, and standards in the US, EC, and Canada including Sarbanes-Oxley, HIPAA, and the Data Protection Act-UK. The metrics covered are scaled by information sensitivity, asset criticality, and risk, and aligned to correspond with different lateral and hierarchical functions within an organization. They are flexible in terms of measurement boundaries and can be implemented individually or in combination to assess a single security control, system, network, region, or the entire enterprise at any point in the security engineering lifecycle. The text includes numerous examples and sample reports to illustrate these concepts and stresses a complete assessment by evaluating the interaction and interdependence between physical, personnel, IT, and operational security controls. Bringing a wealth of complex information into comprehensible focus, this book is ideal for corporate officers, security managers, internal and independent auditors, and system developers and integrators.

146 citations


Network Information
Related Topics (5)
Electric power system
133K papers, 1.7M citations
73% related
Server
79.5K papers, 1.4M citations
68% related
Network topology
52.2K papers, 1M citations
68% related
Encryption
98.3K papers, 1.4M citations
67% related
Fuzzy logic
151.2K papers, 2.3M citations
67% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202112
202028
201932
201824
201726
201620