Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Ontologies for information security management and governance

View through CrossRef
PurposeThis paper aims to show the difficulties involved in dealing with the quantity, diversity and the lack of semantics security information. It seeks to propose the use of ontologies to tackle the problem.Design/methodology/approachThe paper describes the general methodology to create security ontologies and illustrates the case with the design and validation of two ontologies: system vulnerabilities and security incidents.FindingsTwo examples of ontologies, one related to systems vulnerability and the other related to security incidents (designed to illustrate this proposal) are described. The portability/reusability propriety is demonstrated, inferring that the information structured at lower levels (by security management tools and people) can be successfully used and understood at higher levels (by security governance tools and people).Research limitations/implicationsWork in the area of managing privacy policies, risk assessment and mitigation management, as well as CRM, business alignment and business intelligence, could be greatly eased by using an ontology to properly define the concepts involved in the area.Practical implicationsOntologies can facilitate the interoperability among different security tools, creating a unique way to represent security data and allow the security data from any security tool (for instance, Snort) to be mapped into an ontology, such as the security incident one described in the paper. An example showing how the two ontologies could be plugged into a high level decision‐making system is described at the end.Originality/valueAlthough several previous papers examined the value of using ontologies to represent security information, this one looks at their properties for a possible integrated use of management and governance tools.
Title: Ontologies for information security management and governance
Description:
PurposeThis paper aims to show the difficulties involved in dealing with the quantity, diversity and the lack of semantics security information.
It seeks to propose the use of ontologies to tackle the problem.
Design/methodology/approachThe paper describes the general methodology to create security ontologies and illustrates the case with the design and validation of two ontologies: system vulnerabilities and security incidents.
FindingsTwo examples of ontologies, one related to systems vulnerability and the other related to security incidents (designed to illustrate this proposal) are described.
The portability/reusability propriety is demonstrated, inferring that the information structured at lower levels (by security management tools and people) can be successfully used and understood at higher levels (by security governance tools and people).
Research limitations/implicationsWork in the area of managing privacy policies, risk assessment and mitigation management, as well as CRM, business alignment and business intelligence, could be greatly eased by using an ontology to properly define the concepts involved in the area.
Practical implicationsOntologies can facilitate the interoperability among different security tools, creating a unique way to represent security data and allow the security data from any security tool (for instance, Snort) to be mapped into an ontology, such as the security incident one described in the paper.
An example showing how the two ontologies could be plugged into a high level decision‐making system is described at the end.
Originality/valueAlthough several previous papers examined the value of using ontologies to represent security information, this one looks at their properties for a possible integrated use of management and governance tools.

Related Results

Ontology Alignment Techniques
Ontology Alignment Techniques
Sometimes the use of a single ontology is not sufficient to cover different vocabularies for the same domain, and it becomes necessary to use several ontologies in order to encompa...
FOntCell: Fusion of Ontologies of Cells
FOntCell: Fusion of Ontologies of Cells
AbstractHigh-throughput cell-data technologies such as single-cell RNA-Seq create a demand for algorithms for automatic cell classification and characterization. There exist severa...
Contemporary Security Governance in Nigeria
Contemporary Security Governance in Nigeria
Contemporary Security Governance in Nigeria: Themes and Perspectives examines the theory, practice, and challenges of contemporary security governance in Nigeria and argues for the...
How Should College Physical Education (CPE) Conduct Collaborative Governance? A Survey Based on Chinese Colleges
How Should College Physical Education (CPE) Conduct Collaborative Governance? A Survey Based on Chinese Colleges
Background and Aim: College physical education (CPE) is a Key Stage in the transition from school physical education to national sports. Collaborative governance is an effective ne...
Integrated Water Resources Management Approaches to Improve Water Resources Governance
Integrated Water Resources Management Approaches to Improve Water Resources Governance
The water crisis can alternatively be called a governance crisis. Thus, the demand for good water governance to ensure effective water resources management and to attain specific w...
Exploring the Path of Modernization of Urban Community Governance
Exploring the Path of Modernization of Urban Community Governance
China has entered a new journey of building a modern socialist country in an all-round way. As the basic unit of urban grassroots governance and the spatial organisation of social ...
Differentiating clinical governance, clinical management and clinical practice
Differentiating clinical governance, clinical management and clinical practice
PurposeThis paper seeks to review prior definitions of the umbrella term “clinical governance”. The research question is: do clinical governance definitions adequately distinguish ...

Back to Top