The Navigation Metaphor in Security Economics. / Pieters, Wolter; Barendse, Jeroen; Ford, Margaret; Heath, Claude; Probst, Christian W.; Verbij, Ruud.

In: IEEE Security and Privacy Magazine, Vol. 14, No. 3, 25.05.2016, p. 14-21.

Research output: Contribution to journalArticle

Published

Standard

The Navigation Metaphor in Security Economics. / Pieters, Wolter; Barendse, Jeroen; Ford, Margaret; Heath, Claude; Probst, Christian W.; Verbij, Ruud.

In: IEEE Security and Privacy Magazine, Vol. 14, No. 3, 25.05.2016, p. 14-21.

Research output: Contribution to journalArticle

Harvard

Pieters, W, Barendse, J, Ford, M, Heath, C, Probst, CW & Verbij, R 2016, 'The Navigation Metaphor in Security Economics', IEEE Security and Privacy Magazine, vol. 14, no. 3, pp. 14-21. https://doi.org/10.1109/MSP.2016.47

APA

Pieters, W., Barendse, J., Ford, M., Heath, C., Probst, C. W., & Verbij, R. (2016). The Navigation Metaphor in Security Economics. IEEE Security and Privacy Magazine, 14(3), 14-21. https://doi.org/10.1109/MSP.2016.47

Vancouver

Pieters W, Barendse J, Ford M, Heath C, Probst CW, Verbij R. The Navigation Metaphor in Security Economics. IEEE Security and Privacy Magazine. 2016 May 25;14(3):14-21. https://doi.org/10.1109/MSP.2016.47

Author

Pieters, Wolter ; Barendse, Jeroen ; Ford, Margaret ; Heath, Claude ; Probst, Christian W. ; Verbij, Ruud. / The Navigation Metaphor in Security Economics. In: IEEE Security and Privacy Magazine. 2016 ; Vol. 14, No. 3. pp. 14-21.

BibTeX

@article{d087e84040f84d9a951731d12633e3b5,
title = "The Navigation Metaphor in Security Economics",
abstract = "The navigation metaphor for cybersecurity merges security architecture models and security economics. By identifying the most efficient routes for gaining access to assets from an attacker's viewpoint, an organization can optimize its defenses along these routes. The well-understood concept of navigation makes it easier to motivate and explain security investment to a wide audience, encouraging strategic security decisions.",
keywords = "attack navigators, attacker profiles, cyberattacks, e-commerce, hackers, Internet/Web technologies, navigation, security, security economics, security models, visualization",
author = "Wolter Pieters and Jeroen Barendse and Margaret Ford and Claude Heath and Probst, {Christian W.} and Ruud Verbij",
year = "2016",
month = may,
day = "25",
doi = "10.1109/MSP.2016.47",
language = "English",
volume = "14",
pages = "14--21",
journal = "IEEE Security and Privacy Magazine",
issn = "1540-7993",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
number = "3",

}

RIS

TY - JOUR

T1 - The Navigation Metaphor in Security Economics

AU - Pieters, Wolter

AU - Barendse, Jeroen

AU - Ford, Margaret

AU - Heath, Claude

AU - Probst, Christian W.

AU - Verbij, Ruud

PY - 2016/5/25

Y1 - 2016/5/25

N2 - The navigation metaphor for cybersecurity merges security architecture models and security economics. By identifying the most efficient routes for gaining access to assets from an attacker's viewpoint, an organization can optimize its defenses along these routes. The well-understood concept of navigation makes it easier to motivate and explain security investment to a wide audience, encouraging strategic security decisions.

AB - The navigation metaphor for cybersecurity merges security architecture models and security economics. By identifying the most efficient routes for gaining access to assets from an attacker's viewpoint, an organization can optimize its defenses along these routes. The well-understood concept of navigation makes it easier to motivate and explain security investment to a wide audience, encouraging strategic security decisions.

KW - attack navigators

KW - attacker profiles

KW - cyberattacks

KW - e-commerce

KW - hackers

KW - Internet/Web technologies

KW - navigation

KW - security

KW - security economics

KW - security models

KW - visualization

UR - http://www.scopus.com/inward/record.url?scp=84973359544&partnerID=8YFLogxK

U2 - 10.1109/MSP.2016.47

DO - 10.1109/MSP.2016.47

M3 - Article

VL - 14

SP - 14

EP - 21

JO - IEEE Security and Privacy Magazine

JF - IEEE Security and Privacy Magazine

SN - 1540-7993

IS - 3

ER -