This chapter precisely gives introduction to the three main concepts that support the incident prioritization such as the related work to incident prioritization, understanding risk and some methods for prioritization using decision theories.
Section 3.1 introduces definition for some terminology used in the chapters and continues with the detail of the methods and techniques used as approaches in prioritizing incidents. Since risk assessment is widely used as a criteria and method in incident prioritization, Section 3.2 discusses the concept of risk and method used to evaluate risk. Section 3.3 presents the relationship between decision theory and theory of measurement in the general process of prioritization. Finally, in order to give a general view of prioritization, Section 3.4 discusses the prioritization theory includes some potential methods for the framework.
In the previous chapter, this report has presented a brief new concept on multi type of responses. With this multi type of response, security analyst or automatic system has privileged to select an appropriate response to react on incident. Therefore, either manual or automatic, the process of selecting an appropriate response needs to be done exclusively, systematically and properly. One of the approaches that can be used to select appropriate responses is by arranging or prioritizing incident. Based on the result of incident prioritization process, incident can be valued and therefore it can be mapped with an appropriate response. For example, a high priority incident can be mapped with an active response and a low priority incident with a passive response.
Before this report extends the discussion on how to design the initial framework for the incident prioritization and enhancing IRSs, there are three main topics that need to be discussed. The topics discussed in this chapter are related to incident prioritization, understanding risk, and method for prioritization using decision theory.
Before the discussion proceeds further, it is necessary to clarify some basic terminology used throughout this chapter. Extrapolating from definitions and usages in (Porras et al., 2002; Gupta et al., 2003; Covey, 2004; Karlsson et al., 2004; Karlsson et al., 2007; Alsubhi et al., 2008; Cukier and Panjwani, 2009; Mind Tools Ltd, 2009b), the term prioritization can be transformed as,
Prioritization is a process of making a list of rank according to the goals, suitable criteria and available resources.
In addition, extrapolating from definitions and usages in (Yuill et al., 2000; Salomon and Elsa, 2004; Stephenson, 2005; Wiant, 2005; Hacking-Lexicon, 2009), the term incident can be defined as,
An event of a cyber attack and nothing more than a success threat delivered against vulnerability.
Therefore, using the combination between incident and prioritization terminology;
Incident prioritization is a process of making a rank of incident either using list order or group according to the need and goals of organisation, criteria and method used to evaluate incident and resources that influencing the criteria and goals.
Extension to the terminology, published literatures (Porras et al., 2002; Qin and Lee, 2003; Alsubhi et al., 2008; Dondo, 2008) have shown that there are many approaches can be used to prioritize incidents. The approaches are signature tuning, vulnerabilities prioritization and incident prioritization.
Signature tuning is a process of eliminating of unnecessary rules and signatures. The process optimizes the priority processes by editing and tagging priority on the rules and signatures. For example, Snort 2.1 provides the Severity Identifier Option and this can be used to set priority tag for some rules (Caswell and Beale, 2004). In extension, the process of tagging priority in Snort IDS uses two different approaches;
Furthermore, some commercial products practice a similar approach to the Snort IDS. For example, Cisco System Inc (2009) provides an alert-severity as one of the parameter in signature rules in signature engines.
The advantage of this approach is that it offers pre-prioritization process which benefit for the proactive response. The pre-prioritization process estimates the potential impact and severity for the specific vulnerability based on the characteristic of the vulnerability itself.
On the other hand, drawbacks of this approach are that:
The approach is quite similar to the signature tuning which performs the process of prioritization before the intrusion is detected. Implemented and researched by Dondo (2008), instead of waiting incident to be detected, this approach calculates potential risk for future potential incidents. For example, Dondo (2008) applied a fuzzy system approach with some additional key indicators (KRIs) in accessing potential risk. The estimation of the risk is done by associating three criteria; computer network assets, attacks and vulnerability (Qin and Lee, 2003). Furthermore, the Common Vulnerability Scoring System (CVSS)(Mell et al., 2009) also provides such severity impact score for a particular known vulnerabilities and using this score, the rank and priority of the vulnerability can be done before any incident happen.
The advantage of this approach shares similarity with the signature tuning approach. With additional advantages:
However, the approach also inherent drawback as follows:
Alternatively, unlike the vulnerability prioritization and signature tuning, incident prioritization focuses on the process of investigating and evaluating incident based on the level of potential risk before and after the incident happens. Popularized and implemented in Porras et al. (2002), Qin and Lee (2003), Yu et al. (2004) and Zhang et al. (2009), this approach uses risk assessment on the prioritizing incident. For example;
Since this approach is done before and after the incident, it also inherits some advantages and reduces the drawback from the previous approach. The advantages of adopting incident prioritization are that:
On the other hand, the approach also inherent drawback as follows:
However, in a relation to the security evaluation and risk assessment, Arnes et al. (2006) use Hidden Markov Model (HMM) and Mu et al. (2008) introduce online risk assessment. Both projects not discuss anything that can relate to incident prioritization, but generally discuss on how to estimate the risk of intrusions.
Moreover, evaluating risk using risk assessment promises significant results in prioritizing incident and vulnerability, but measuring more factors other than risk can also be used to prioritize incident. For example, cost-sensitive approach, where a response is selected based on several cost factors such as operational cost, damage cost and response cost. This approach which introduced in (Lee et al., 2002; Stakhanova et al., 2007; Wang et al., 2007; Yaorui and Shufen, 2008) discussed the relationship between cost factor and responses but unfortunately the researches not highlight about the incident prioritization or prioritizing process. However, based on the relationship between the selection of response and costs, apparently, the projects have prioritized the incident indirectly. Fundamentally, the cost-sensitive model introduced by Lee et al. (2002) and suggested a qualitative approach on calculating the cost factors. The difference between damage cost and response cost helps intrusion response to determine appropriate response either ignore, investigate, blocking or terminating attacks. Therefore, by differentiating response, perhaps this can also be considered as prioritizing incident.
In term of the process of prioritizing incident, the aforementioned approaches share some similarities. The similarities of the approach can be categorised into three main perspectives. The perspectives are;
Based on the incident prioritization terminology given earlier, the goal of the incident prioritization is either to produce a priority list of incident or a priority group of the incident based on the method of analysis, support indicators and constraint of resources. In this particular context, the research conducted by Dondo (2008) applied a priority list for the vulnerabilities prioritization and (Porras et al., 2002; Qin and Lee, 2003; Alsubhi et al., 2008) make priority by having a group of priority such as low, medium, and high priority.
In order to evaluate and investigate the incident, researchers (Porras et al., 2002; Qin and Lee, 2003; Alsubhi et al., 2008; Dondo, 2008) utilized a combination between probability of attack and asset as a main criteria to evaluate incident and vulnerability. Clearly, the combination between the probability of attack and asset can be done using risk assessment. However, there is other approach used to create a relationship between responses and costs using cost-sensitive analysis (Lee et al., 2002) and this relationship apparently can be seen as an initial process of incident prioritization.
Criteria used to evaluate incident refers to factor that influence the process of evaluating incident. Based on the aforementioned approach, the criteria are divided into two main criteria, the resources and indicators that influence the decision.
The resources are related to the current information. The information can be divided into two type of information like asset information and attack information.
The indicators are related to the uncertain factors which refer to the combination of the asset information and attack information. In general, it is also used to support the process of estimating the risk. The uncertain factor such as sensor sensitivity, applicability of attacks, importance of victims, attack severity, asset criticality, relationship between alerts, service stability, social activity between attackers and victim and cost (e.g. operational cost, damage cost and response cost) are commonly used to evaluate the incident either using quantitatively or qualitatively assessment.
In highlighting the similarity of the approaches, the aforementioned approaches also share some limitation. The limitations are;
Even though the current solution still inherits some limitation for the process of incident prioritization, it is also can be considered as acceptable approaches. Therefore, the initial framework for this research will try to reduce the current limitation and introduces a new solution in order to engage the limitation. The introduction of the initial framework for the incident prioritization will be discussed in the end of this report.
However, the current concept of incident prioritization only helps to understand the state-of-art in the technique and method used in prioritizing incident but not the detail of the processes. It is clearly defined that one of the approaches used to prioritize incident is using risk assessment. Therefore, to continue the further discussion especially on the relationship between risk assessment and incident prioritization, the next section introduces the concept of risk and initially discusses how the risk assessment can be used to help in enhancing the process of prioritization.
As discussed in Section 3.1.3, the incident prioritization can be systematically done by using risk assessment. Hence, with the intention of giving an overview and the concept of risk, this report extends the discussion in this section on the detail about understanding risk and how to use risk assessment as one of the approaches in estimating risk and finally prioritize the incident. The discussion not only covers the meaning of the risk, but covers also the risk assessment and how to evaluate risk using quantitative and qualitative assessment. With the concept of the risk, each incident can be evaluated and therefore, with the result of the risk assessment, later it can be prioritized.
Literally, it is difficult to define an absolute meaning of the risk terminology. According to Kaplan (1997), there is no an absolute meaning of risk and it is better not to define the meaning. However, this report attempts to understand the risk by giving it an appropriate meaning. The word 'risk' has been used for ages in many different aspect such as business risk, social risk, economic risk, investment risk, political risk and so forth. Some literatures (Kaplan and Garrick, 1981; Kaplan, 1997; Hubbard, 2007) described risk by giving distinction and relationship between risk and uncertainty. Kaplan and Garrick (1981) symbolically defined the relationship between risk and uncertainty. They define risk as a total combination of uncertainties and damages. More precisely, Kaplan (1997) expressed risk as a complete set between three entities; scenario, the likelihood of the scenario and the consequences of the scenario. More, using intersection between three areas; criticality, vulnerability and threat, Bass and Robichaux (2001) proposed a qualified operational risk. Additionally, in many security books (Bejtlich, 2004; Jones and Ashenden, 2005; Davis et al., 2007), risk is defined as a combination of threat, vulnerability and asset value. Additionally, Pfleeger (2006) defined the risk as a combination between a loss associated with events (impact), the likelihood of the event occurring (problem) and the degree that can change and reduce the impact (control). Similarly, in the British Standard, the risk is identified as a combination between assets, threats, vulnerabilities and impact (BS ISO/IEC 27001, 2005).
Therefore, combination of above definitions, this report will use the risk definition as:
Risk is a combination of the likelihood of event and the consequences of the event.
Additionally, this report extends the meaning of the likelihood of event and the consequences of the event.
Kaplan (1997) defines likelihood as a frequency or probability or frequency and probability. According to Kaplan (1997), frequency applies to a repetitive situation and probability applies to the degree of confidence dictated by evidence. Moreover, the combination between frequency and probability apply to the uncertain repetitive situation. In addition, in risk management, probability is a degree of likelihood of the risk occurring (JISC Infonet, 2009). For example, some authors (Bejtlich, 2004; Jones and Ashenden, 2005; Davis et al., 2007) use likelihood of threat and vulnerability as a probability in evaluating risk related to incident and intrusion. Furthermore, in the British Standard, the realistic likelihood is related to the security failures and it associated with activities of threats, vulnerabilities, impacts on asset and control (BS ISO/IEC 27001, 2005).
Therefore, in this report, the likelihood of event is defined as;
The likelihood of event is the probability of event and estimates using a combination of threats and vulnerabilities.
On the other hand, the consequence of the event refers to the element that has a direct impact that link to the event. For example, the direct impact to the incident and intrusion can be referred as impact of assets. This is obviously and clearly explained in Bejtlich (2004) and Davis et al. (2007) where they associate the risk definition with the asset value. Additionally, the British Standard uses business impact and associates it with the loss of confidentiality, integrity and availability of assets (BS ISO/IEC 27001, 2005). Furthermore, the impact can be assessed in terms of its effects on time, cost and quality (JISC Infonet, 2009). Therefore, impact on assets can be assessed by looking into the detail of its criticality in terms of cost, time and quality.
Therefore, in this report, the consequence of the event is defined as;
The consequence of event is the impact on asset and estimates using a current assets and controls.
To understand clearly on how incident can be used to prioritize using risk; this report extends the discussion on risk assessment.
In incident prioritization, risk assessment can be used to determine the relationship between the likelihood of event (probability of threat and vulnerability) and the consequences of the event (impact on asset). Additionally, risk assessment is also widely used in other operation. For example, financial organisation uses risk assessment in determining and identifying any related exposure to system that potentially could effect the financial operation (Pfleeger, 2006). Unlike risk assessment for business operations which focuses on the overall process of the business, risk assessment in a context of computer security focuses on assessing the likelihood of attack, likelihood of adversary success given attack, and consequences given success for a variety of threat scenarios (McGill, 2007).
The risk assessment also focuses on a study to locate security vulnerabilities and risks. The assessment normally includes an evaluation of both physical and technical risks, uses personal interviews, vulnerability scans, and on-site observation to evaluate risk (Fry and Nystrom, 2009). Moreover, Gregg and Kim (2005) linked risk assessment with risk management and define it as a process of reducing risk to information technology assets. The process can be done by identifying and eliminating threats through the deployment of security controls and security countermeasures. Defined as a first process in the risk management methodology, the risk assessment used by organisation to determine the extent of the potential threat and risk associated with an IT system (Stoneburner et al., 2002).
In a specific context, especially in a computer security risk management, Campbell and Sands (1979) proposed a modular approach. The modular approach is designed to provide a responsive framework according to the need of the environment. The approach contains several assessment includes vulnerability analysis, threat analysis, risk assessment and control assessment.
In general, risk management is defined as a systematic process in identify, analyse and respond to project risks. There are sub-processes applicable in risk management and basically the model for risk management is divided into five sub-processes (Figure 5), quoting from JISC Infonet (JISC Infonet, 2009), the risk management contains;
However risk assessment steps proposed by Pfleeger (2006) are as follows:
Additionally, the National Institute of Standards and Technology applies nine primary steps in risk assessment and the 2nd, 3rd, 4th, and 6th step can be executed parallel immediately after the 1st step has be completed (Stoneburner et al., 2002). The steps are:
Alternatively, instead of having many steps , other quantitative methodologies concluded by Hamdi and Boudriga (2005) introduced only four steps:
Based on the aforementioned risk assessment steps, basically, the process of risk assessment provides a process of identifying relationship between probabilistic and impact, particularly between assets, vulnerabilities, threats, control and countermeasures. Therefore, the risk assessment can be simplified into three main steps as follows:
1. Identify and list assets (or group of assets), tangibly or intangibly, continue by valuing of each asset.
The first process of risk assessment is identifying and listing of all assets in the organisation. For example, this step can be done by creating a matrix of assets that contain valuable information and critical to organisation. Every single asset can be valued manually by the security analyst or automatically by computer system. In any network environment for example, collecting and gaining information about assets are much easier compare to the normal businesses operations. This process can be done by scanning the entire network and running operating system finger printing software such as NMAP or Passive OS Fingerprinting. By doing this, devices that are directly attached to the network can be listed easily. Then, the process is followed by a process of valuing assets. The process of valuing asset can be done quantitatively and qualitatively. In this particular aspect, some other factors can be used to estimate the value of asset such as bandwidth utilization, number of users, level of confidentiality, integrity, availability and criticality, number of services provided and dependencies with other devices.
2. For each network asset, identify and associate threats and vulnerabilities.
The next process of the risk assessment is identifying and associating threats and vulnerabilities with assets. Some risk assessment researches like Porras (2002), Zhang et al. (2009), Mu et al. (2008), Dondo (2008) and Alsubhi et al. (2008) potentially show on how to identify and associate threat and vulnerability with assets. In addition, the response-oriented Intrusion Taxonomy introduced by Papadaki (2004) also shows a mapping between specific threats and vulnerabilities.
3. Calculate quantitatively or qualitatively the possible impact analysis for each threat and vulnerability that associated with each asset.
Finally, with the value of asset and some additional calculation on the probability of threat and vulnerabilities, the possible potential risk assessment for each threat that associated with each asset can be estimated.
In addition to the risk assessment process, there is range of tools that can be used to support the risk assessment process. The current tools today are including the CCTA (Central Computer and Telecommunications Agency) Risk Analysis and Management Method (CRAMM), COBRA and Operationally Critical Threat, Asset, And Vulnerability Evaluation (OCTAVE). Most of the tools use a similar method and commonly use qualitative data to produce significant results. Other than that, there are other tools produced by the Information Security Forum (ISF, 2009) such as Fundamental Information Risk Management (FIRM), Information Risk Analysis Methodology (IRAM), Simple to Apply Risk Analysis (SARA) and Simplified Process for Risk Identification (SPRINT).
However, when dealing with risk assessment, particularly for private and public organization, nowadays there are now many new laws and mandates that impact the requirements and scope of the risk assessment. These laws and mandates are also important to promote security standard and guideline for public and private organisation in organising and dealing with security matters. For example, Health Insurance Portability and Accountability Act (HIPAA), Gramm-Leach-Bliley Act (GLBA), Federal Information Security Management Act (FISMA) and Section 404 - Sarbanes-Oxley Act, Section 404 (SOX). However, with the limitation of the research, the laws and mandates denoted above will not be considered in designing the initial framework in this research project. Additionally, the aforementioned mandates and laws are only applied to certain countries especially in the United States and not a general practice for the whole world and all organisations. Therefore, the laws and mandates can not be as one of the criteria in designing the initial framework for incident prioritization.
In extension to the risk assessment, mainly in the second and third step of the risk assessment, there are two approaches that can be used to conduct the detail analysis; using quantitative risk assessment and quantitative risk assessment. Depends on the usage, both approaches are significant to any environment and for the use of the incident prioritization process; it may produces a better comparison result.
For instance, some organisation may conduct a risk assessment using qualitative approach and some organisation may conduct it using quantitative approaches. Both approaches may influence the final result of prioritization where qualitative technique may produces a group of qualitative rank such as low, medium or high whereas quantitative technique may produces a list of rank in numbers.
In this particular context, to determine and estimate the relationship between threats, vulnerabilities, asset and control, the risk assessment uses two different approaches;
According to Gregg and Kim (2005), quantitative risk assessment is a methodical, step-by-step calculation of asset valuation, exposure to threat and the financial impact or lost in the event. Quantitative assessment uses monetary values and applies it to the components used in the estimation process (Munteanu, 2006).
Using quantifiable data and results, quantitative risk assessment is related to the employment of mathematical model and theory. Therefore, quantitative assessment produces a lot of numbers relationship, mathematical equations and uses statistical technique in the detail of the analysis. For example, the Exposure Factor (EF), Single Loss Expectancy (SLE), Annualized Loss Expectancy (ALE), Annualized Rate of Occurrence (ARO) and Safeguard cost/benefit analysis (Tan, 2002; Hamdi and Boudriga, 2005; Munteanu, 2006). According to them, the calculation for the computer security risk assessment methods can be relied on the Annualized Loss Expectancy (ALE).
In extension, Butler (2002) and Ekelhart et al. (2007) discussed the relationship between result of the quantitative risk assessment and cost-sensitive or cost-benefit analysis. The cost and benefit ratio of individual safeguard discussed by Ekelhart et al. (2007) is apparently similar to the research in the cost-sensitive modelling for intrusion detection and response by Lee et al. (2002). Therefore, this approach has significant value in designing the initial framework for the incident prioritization.
However, this approach inherent some advantages. The advantages of the quantitative risk assessment approach are;
However, the drawbacks of the quantitative risk assessment are;
Since there are many drawbacks, this approach will not be considered in this project.
Alternatively, instead of having numbers and equation in the quantitative risk assessment, qualitative risk assessment is a scenario-based approach (Munteanu, 2006), where the scenario is examined and assessed for each critical or major threat to an asset (Gregg and Kim, 2005). The qualitative risk assessment requires a calculation on intangible factors such as impact (e.g. asset criticality) and subjective attack probability (e.g. high, low and medium level of threat and vulnerability). In this approach, intangible factors and subjective probability need to be measured so that the value is quantifiable and easy to evaluate and compute. The purpose of the assessment is to provide a consistent and subjective assessment of the risk (Gregg and Kim, 2005). In order to estimate the risk using the qualitative risk assessment, it uses other additional elements such as;
However, the table, matrix and scale can be changed according to the need of the organisation. There is no absolute guideline in determine which scale is the best, perhaps depend on the scale used, it helps to reduce the vagueness amongst decision makers.
In the meantime, the advantages of the qualitative risk assessment are;
However, the drawbacks of the approach are;
Both approaches promise a significant result in valuing threats, assets and vulnerabilities. However, both approaches also give almost similar values in term of the advantages and disadvantages.
In extension to this particular project, the initial framework for incident prioritization uses the qualitative risk assessment in assessing the risk for the incident. Even though the qualitative risk assessment inherent many disadvantages, but the disadvantages are more to the data interpretation and subjective level. However, in order to reduce the misinterpretation and subjectivity, assessing uncertainty may help to solve the problem. Understanding on how to measure uncertainty is a key to measuring risk (Hubbard, 2007). In order to measure uncertainty, Hubbard (2007) proposed a method of measuring uncertainty by using a decomposition technique. The decomposition involves figuring out on how to compute something very uncertain from other things that are a lot less uncertain or at least easier to measure. In the other word, decomposition breaks the uncertain factors into another small part of less uncertain factors. Therefore, reducing the uncertainty element in calculating probability and impact is possible to help to improve the process of measurement. The detail about how to measure uncertainty element and other intangible factor involve in the initial framework will be discussed in the next chapter.
However, before this report proceeds with the new chapter, there are other theories that can be used to help to rank the priority of the risk. With the concept of decision theory and theory of measurement, next section discusses about the other possibility and approach of making decision and at the same time it helps to prioritize options and risks.
Although the process of prioritizing incident can be done systematically using risk assessment, understanding the risk itself is not enough to prioritize incident. Perhaps, with the additional theory on prioritization like decision theory could be used to help to boost the process. In this section, using some decision theory and theory of measurement, the general process of prioritization is discussed. Using the combination between those theories, some other method for making decision are discussed.
Developing a systematic approach on prioritizing incident is not an easy task. Therefore, in selecting a systematic approach in prioritizing incident, there are many approaches that can be used to prioritize incident. Perhaps, aforementioned discussion about the used of risk assessment is one of the example, common and significant approach used to evaluate and prioritize incident.
However, in a broader aspect of prioritization in other research areas, there are other methods that can be followed. The next section discusses the method of prioritization, particularly in the area of decision theory. The discussion is not limit to the discussion on the method used in prioritizing incident and vulnerabilities but more general.
Since there are many approaches proposed, there are confusions amongst administrators on selecting which method is the best. Therefore, in reducing the confusions, theory of scales in measurement system can be used to differentiate between methods.
In the theory of scales, Stevens (1946) introduces four different types of scale in measurement; nominal, ordinal, interval and ratio. Karlsson, Hast and Regnell (2006) applied an ordinal and ratio to categorise the prioritization methods based on ranking strategies. Although the theory received few critics from other researcher (Velleman and Leland, 1993), the theory of scales has been evolved and latest searching on the Internet, there are more than 1000 publication literatures use the theory (Google, 2009).
Two main scales are widely used in the process of prioritization; a ratio scale and an ordinal scale.
The categories described in Table 4 below shows the multi-type of prioritization method and most of the methods are using the ordinal scale as a main scale for ranking strategy.
Even though there are two types of scales used to prioritize options, method of prioritization can be used to transform from one scale to another. For example, the exchangeable process from ordinal scale to a ratio scale and vice versa. Using intangible options and method like the AHP or pair wise comparison method, the approach can transform ordinal scale to ratio scale with a significant relationship between options.
This section discusses some potential method that helps to reduce the problem of the current prioritization process. As mentioned earlier, there are some disadvantages of the current prioritization process. Therefore, these potential methods help to reduce some of the limitations. The limitations associated with this section are (refer to Section 3.1.4):
Both limitations can be addressed using the combination of one or more of the methods. However, in this particular report, the appropriate method is not selected yet, therefore, some the possible and potential method will be discussed. The selection of the best method will be done in the PhD stages.
Instead of addressing all the method (as mentioned), based on the limitation mentioned, this report chooses some of the significant and relevant method. The methods are:
The reason of the selecting the above methods because they have potential to solve the aforementioned limitation. For instance, some of the methods such as Voting Scheme Method, Analytic Hierarchical process (AHP) and Grid Analysis have a capability to prioritize options using difference weight value of indicator. In addition, the Paired Comparison Analysis able to give and estimate the difference weight value for the indicator. Finally, the Covey's Quadrants have a potential to divide options or incident into specific groups.
This report does not consider the other method which expresses similar to the five chosen methods. Some of the methods are also insignificant and not suitable to this project. For instance, Weiger's Method (Wiegers, 1999) and Grounded Theory (Herrmann and Daneva, 2008) are related to the cost-benefit approach. The Binary Search Tree (BST) (Karlsson et al., 1998) is an algorithm used to sort and search information. Priority Group (Karlsson et al., 1998; Karlsson et al., 2007), Action Priority Matrix, Eisenhower Method are similar to the Covey's Quadrants. In addition, Planning Game Portioning (PG) performs similar to the Priority Groups by using sorting algorithm to sort option and requirement (also called a story card) (Karlsson et al., 2007). Similar to the method used by Covey (2004), the ABC Analysis presents high-level prioritization by ranking tasks into three main groups; A - very important, B - important, and C - least important (Chu et al., 2008). In addition, the combination of the ABC Analysis and Pareto Principle promises an alternative method to prioritize options. Similar to the Cover's Quadrants, by grouping option into different groups, and group are prioritized according to its priority.
Other unsuitable method, Theory-W also known as "Win-Win", proposed by Boehm and Ross (Boehm and Ross, 1989) supports negotiations between stakeholders in solving disagreement about software requirements and ensures win-win situation between them. This method uses risk assessment and risk handling to ensure the stakeholders' "win-win" condition is secured. Since this not use a technical aspect on prioritizing option, it seems not practical.
Note that other than this example, there are other methods are not discussed in this report.
In order to understand the detail of the methods, the next section presents the selected methods for prioritization.
There are many methods used in prioritizing option or task or decision. The method is not only limit on the process of prioritizing task in selecting best options but at the same time optimizes the objective of goal, the use of criteria and resources that influence the criteria and goals such as time and cost. The method of prioritization is widely used in daily life, particularly in decision making in managing business environment. There are few and difference perceptive applied by organisation in selecting which method is the best and fit with their need but the final goal is only to have the best solution in managing tasks, options, people and so on.
Some discussion on the method for prioritization is taken from the area of software engineering where this method normally used to prioritize software requirement. Therefore, in order to avoid conflict in term of meaning of requirements and options, the word 'requirement' will be used in interchangeable with the word 'options' and literally has similar meaning. In the discussion, the words 'option' refers to the task, decision, object, requirement and anything that need to be prioritized. The word 'option' used here does not depict to the real meaning of option, therefore, it is not a definition of option.
In extension to the Delphi Method (Helmer, 1967), the voting scheme prioritization method uses traditional approach and face-to-face discussion like the Delphi Method. Since the Delphi method uses a common and traditional approach in making appropriate decision, the voting scheme method helps to prioritize options if discussion involves many criteria, factors and experts. The voting scheme allows experts to show their preferences on prioritizing options. In this particular method, each expert votes for their prefer option and the highest vote for a particular option considered as a highest priority.
Other than the original voting scheme, there are many methods similar to the voting scheme such as multi-voting, cumulative-voting and 100-Point Method.
In addition to the traditional Cumulative Voting, Berander and Jansson (2006) introduced a new techniques of prioritizing using hierarchical structure requirement on a ratio scale, Hierarchical Cumulative Voting (HCV). The HCV uses Analytic Hierarchical Process (AHP) by addressing the weaknesses of the method and combine with the strength of the Cumulative Voting.
Fundamentally, the Analytic Hierarchical Process (AHP) is a theory of measurement through pair wise comparisons and relies on the judgements of experts to derive priority scales (Saaty, 2008). Over a decade, the AHP has been used as a method for decision makers in solving complicated and decision problems. Zahedi (1986) in the report published in the year 1986 had shown that many applications in diverse and numerous area apply the AHP in making decision. The AHP is not limit as a method to solve complicated problem but also widely used as a method to rate decision alternative which involve both tangible and intangibles criteria for evaluation, selection and prediction. Hence, the AHP can be used as a decision method not only for selecting best decision but at the same time prioritizes decision alternatives.
In order to organise systematic procedure for prioritization, the AHP consists four main steps, quoting from Saaty (2008);
The AHP is a common and widely approach in prioritizing options. For example, in prioritizing value and cost, Karlsson and Ryan (1997) utilized AHP and pair-wise comparison method in evaluating in between cost and value. In this particular research, also called as Cost-Value Approach, the AHP is combined with other method like pair-wise comparison method and the combination has been proved as a success approach.
In addition, this method has been combined with other method such as Planning Game Portioning (PG), Theory-W and ABC Analysis. In direction to reduce the weaknesses and increase the strengths of the PG, particularly subjectiveness between option, the combination of PG with AHP (PGcAHP) is proposed (Karlsson et al., 2004; Ahl, 2005). In addition to the original Boehm's Theory-W, Ruhe et al. (2002) proposed the Quantitative Win-Win by combining the AHP method. In this particular method, like other hybrid prioritization method, Ruhe et al. (2002) uses AHP in determine the priorities between stakeholders, requirement class and resource constrains.
Chen et al. (2008) and Chu et al. (2008) reported that the latest concept of the ABC Analysis, Multiple Criteria ABC (MCABC) Analysis is widely used by combining other than prioritization method include the Analytic Hierarchical Process (AHP), statistical analysis, weighted linear programming, fuzzy classification and many other classification method.
The Paired Comparison Analysis involves a process of comparing two or more alternative options and give priorities for option that has more advantages. In the process of comparison, each alternative will be compared with other alternative and continues by choosing which is most important and give greatest advantage in between two pair options (Mind Tools Ltd, 2009a). The process continues with other two pair options until all options are compared.
Unlike the AHP which uses a goal of decision as a main objective of prioritization, the Paired Comparison Analysis is popular to be applied where organisation has no objective but at the same time need a simple and unclear prioritize option (HR Management, 2009).
The Paired Comparison Analysis or also known as Pair-wise Comparison is sometimes can be used as a method to determine the weight between options. For example, weight for criteria in the AHP (Saaty, 2008) and weight for factors in the Grid Analysis (Manktelow, 2003) can use Paired Comparison Analysis in order to obtain the basic comparison value.
There are six typical steps in the analysis, quoting from (Mind Tools Ltd, 2009a);
The alternate calculation for Pairwise comparison method introduced in the AHP uses different method calculation. The calculation uses "eigenvalue" method to estimate the relative weight of decision elements (Zahedi, 1986).
Grid Analysis is another method used in decision-making and functionally to make a decision where many factors must be balanced. Using the Grid-Analysis, option can be prioritized even though it has many alternatives and factors to take into considerations (Manktelow, 2003).
There are five steps to follow;
Unlike complicated calculation and numbering on other previous methods, Covey (2004) introduces high-level prioritization scheme by using time management concepts. The high-level prioritization not looks deeply into the detail of criteria and influencing factor, instead, Covey (2004) categorizes task into four quadrants based on the important and urgent of task. The four quadrants include;
Unlike complicated calculation and numbering on other previous methods, Covey (2004) introduces high-level prioritization scheme by using time management concepts. The high-level prioritization not looks deeply into the detail of criteria and influencing factor, instead, Covey (2004) categorizes task into four quadrants based on the important and urgent of task. The four quadrants include;
The quadrant specifies the use of time in term of important and urgent. In this particular method, important and urgent task will be grouped into first quadrant, and for not important and not urgent task, the task will be grouped into last quadrants. This method uses high-level of uncertainty where task and option can be grouped according to the suitability based on the need of decision makers.
Since this method provides a fix group of priorities where first quadrant is the most important and urgent compares to others, it is difficult to assign task directly under appropriate group. Therefore, a detail prioritization method like the AHP and Grid Analysis perhaps can be used to calculate which task is appropriate to be grouped into suitable quadrants and which task should be done first within a same quadrant.
Additional to the Covey's Quadrants, there are other methods similar to this approach where they devide task and option into fixed groups or quadrants. The approaches like the Eisenhower Method, Action Priority Matrix, Urgent/Important Matrix and Impact Feasibility Matrix are some of the examples.
The Eisenhower Method (Time Management Training, 2009) is a method used in the context of project management and deals ultimately with time management. Similar to the method described by Covey's Quadrants, the Eisenhower Method evaluates tasks in determining daily priorities using two criteria; important and urgent (Mind Tools Ltd, 2009b).
Alternatively, popularised by the MindTools.com (2009b), the Action Priority Matrix (also known as the Impact Feasibility Matrix) approach makes the very most of option opportunities as a top priority. Instead of having urgent and important criteria, Figure 9 shows the Action Priority Matrix. The matrix uses impact and effort as basic criteria.
This chapter has discussed three sections and divided into three main topics like incident prioritization, understanding risk and method of prioritization. With the intention to extend and enhance the process of selecting response in Intrusion Response Systems, conceptually, the combination of the concepts will help to boost the process.
Firstly, this chapter has discussed some of the previous work on the incident prioritization. The discussion is widely covered on the response techniques used in managing incident from Intrusion Detections Systems. This chapter has discussed the limitation of the current work and with it the further study is continued.
Secondly, the chapter continued by discussing a concept of risk and how risk is evaluated. Deeply discussed about the common method applied in risk assessment, the chapter also showed some advantages and disadvantages of the approach in order to give a better selection and understanding.
Finally, as a part of the discussion, using decision theory, this chapter discussed the basic and general method for prioritization. The discussion is not limit to the discussion on the theory itself but also some example on how to use to method it self. With a combination of the theory of scale of measurement, the discussions on the methods are divided into two types of scale which are an ordinal scale and ratio scale.
Since there are some topics need a further discussion, particularly in measuring intangible element and subjective factors in risk assessment, the next chapter extends some theories of measurement includes measuring incident, threat, vulnerability and impact.
The three main concepts. (2017, Jun 26).
Retrieved November 5, 2024 , from
https://studydriver.com/the-three-main-concepts/
A professional writer will make a clear, mistake-free paper for you!
Get help with your assignmentPlease check your inbox
Hi!
I'm Amy :)
I can help you save hours on your homework. Let's start by finding a writer.
Find Writer