Return to search

Quantifying and managing the risk of information security breaches participants in a supply chain / Quantifying and managing the risk of information security breaches to the supply chain

Thesis (M. Eng. in Logistics)--Massachusetts Institute of Technology, Engineering Systems Division, 2005. / Includes bibliographical references (leaf 70). / Technical integration between companies can result in an increased risk of information security breaches. This thesis proposes a methodology for quantifying information security risk to a supply chain participant. Given a system responsible for supply chain interaction and the vulnerabilities attributed to the system, the variables that determine the probability and severity of security incidents were used to create a model to quantify the risk within three hypothetical information systems. The probability of an incident occurring was determined by rating the availability and ease of performing an exploit, the attractiveness of the target and an estimate of the frequency of the attack occurring Internet wide. In assigning a monetary value to the incident, the outcome from an attack was considered in terms of the direct impact on the business process and the potential impact on partnerships. A method for determining mitigation strategies was then proposed based on a given set of monetary constraints and the realization of corporate security policy. / by Cynthia Lynn Bellefeuille. / M.Eng.in Logistics

Identiferoai:union.ndltd.org:MIT/oai:dspace.mit.edu:1721.1/33313
Date January 2005
CreatorsBellefeuille, Cynthia Lynn
ContributorsGeorge Kocur., Massachusetts Institute of Technology. Engineering Systems Division., Massachusetts Institute of Technology. Engineering Systems Division.
PublisherMassachusetts Institute of Technology
Source SetsM.I.T. Theses and Dissertation
LanguageEnglish
Detected LanguageEnglish
TypeThesis
Format74 leaves, 3803915 bytes, 3806941 bytes, application/pdf, application/pdf, application/pdf
RightsM.I.T. theses are protected by copyright. They may be viewed from this source for any purpose, but reproduction or distribution in any format is prohibited without written permission. See provided URL for inquiries about permission., http://dspace.mit.edu/handle/1721.1/7582

Page generated in 0.0096 seconds