To read this content please select one of the options below:

G-RAM framework for software risk assessment and mitigation strategies in organisations

Baidyanath Biswas (Information Technology and Systems, Indian Institute of Management, Lucknow, India)
Arunabha Mukhopadhyay (Information Technology and Systems, Indian Institute of Management, Lucknow, India)

Journal of Enterprise Information Management

ISSN: 1741-0398

Article publication date: 5 March 2018

778

Abstract

Purpose

Malicious attackers frequently breach information systems by exploiting disclosed software vulnerabilities. Knowledge of these vulnerabilities over time is essential to decide the use of software products by organisations. The purpose of this paper is to propose a novel G-RAM framework for business organisations to assess and mitigate risks arising out of software vulnerabilities.

Design/methodology/approach

The G-RAM risk assessment module uses GARCH to model vulnerability growth. Using 16-year data across 1999-2016 from the National Vulnerability Database, the authors estimate the model parameters and validate the prediction accuracy. Next, the G-RAM risk mitigation module designs optimal software portfolio using Markowitz’s mean-variance optimisation for a given IT budget and preference.

Findings

Based on an empirical analysis, this study establishes that vulnerability follows a non-linear, time-dependent, heteroskedastic growth pattern. Further, efficient software combinations are proposed that optimise correlated risk. The study also reports the empirical evidence of a shift in efficient frontier of software configurations with time.

Research limitations/implications

Existing assumption of independent and identically distributed residuals after vulnerability function fitting is incorrect. This study applies GARCH technique to measure volatility clustering and mean reversal. The risk (or volatility) represented by the instantaneous variance is dependent on the immediately previous one, as well as on the unconditional variance of the entire vulnerability growth process.

Practical implications

The volatility-based estimation of vulnerability growth is a risk assessment mechanism. Next, the portfolio analysis acts as a risk mitigation activity. Results from this study can decide patch management cycle needed for each software – individual or group patching. G-RAM also ranks them into a 2×2 risk-return matrix to ensure that the correlated risk is diversified. Finally the paper helps the business firms to decide what to purchase and what to avoid.

Originality/value

Contrary to the existing techniques which either analyse with statistical distributions or linear econometric methods, this study establishes that vulnerability growth follows a non-linear, time-dependent, heteroskedastic pattern. The paper also links software risk assessment to IT governance and strategic business objectives. To the authors’ knowledge, this is the first study in IT security to examine and forecast volatility, and further design risk-optimal software portfolios.

Keywords

Acknowledgements

The authors wish to express their sincerest thanks to the two anonymous referees for their encouraging suggestions that led to considerable improvements of this paper. The authors also wish to thank the Chief Editor of this journal, Professor Zahir Irani and the Deputy Editor, Professor Muhammad Kamal for their overall inputs on this paper, continued guidance and support throughout the revision process.

Citation

Biswas, B. and Mukhopadhyay, A. (2018), "G-RAM framework for software risk assessment and mitigation strategies in organisations", Journal of Enterprise Information Management, Vol. 31 No. 2, pp. 276-299. https://doi.org/10.1108/JEIM-05-2017-0069

Publisher

:

Emerald Publishing Limited

Copyright © 2018, Emerald Publishing Limited

Related articles