Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Teodor Sommestad is active.

Publication


Featured researches published by Teodor Sommestad.


enterprise distributed object computing | 2007

A Tool for Enterprise Architecture Analysis

Pontus Johnson; Erik Johansson; Teodor Sommestad; Johan Ullberg

The discipline of enterprise architecture advocates the use of models to support decision-making on enterprise-wide information system issues. In order to provide such support, enterprise architecture models should be amenable to analyses of various properties, as e.g. the availability, performance, interoperability, modifiability, and information security of the modeled enterprise information systems. This paper presents a software tool for such analyses. The tool guides the user in the generation of enterprise architecture models and subjects these models to analyses resulting in quantitative measures of the chosen quality attribute. The paper describes and exemplifies both the architecture and the usage of the tool.


Computers & Security | 2010

A probabilistic relational model for security risk analysis

Teodor Sommestad; Mathias Ekstedt; Pontus Johnson

Information system security risk, defined as the product of the monetary losses associated with security incidents and the probability that they occur, is a suitable decision criterion when considering different information system architectures. This paper describes how probabilistic relational models can be used to specify architecture metamodels so that security risk can be inferred from metamodel instantiations. A probabilistic relational model contains classes, attributes, and class-relationships. It can be used to specify architectural metamodels similar to class diagrams in the Unified Modeling Language. In addition, a probabilistic relational model makes it possible to associate a probabilistic dependency model to the attributes of classes in the architectural metamodel. This paper proposes a set of abstract classes that can be used to create probabilistic relational models so that they enable inference of security risk from instantiated architecture models. If an architecture metamodel is created by specializing the abstract classes proposed in this paper, the instantiations of the metamodel will generate a probabilistic dependency model that can be used to calculate the security risk associated with these instantiations. The abstract classes make it possible to derive the dependency model and calculate security risk from an instance model that only specifies assets and their relationships to each other. Hence, the person instantiating the architecture metamodel is not required to assess complex security attributes to quantify security risk using the instance model.


IEEE Systems Journal | 2013

The Cyber Security Modeling Language: A Tool for Assessing the Vulnerability of Enterprise System Architectures

Teodor Sommestad; Mathias Ekstedt; Hannes Holm

The cyber security modeling language (CySeMoL) is a modeling language for enterprise-level system architectures coupled to a probabilistic inference engine. If the computer systems of an enterprise are modeled with CySeMoL, this inference engine can assess the probability that attacks on the systems will succeed. The theory used for the attack-probability calculations in CySeMoL is a compilation of research results on a number of security domains and covers a range of attacks and countermeasures. The theory has previously been validated on a component level. In this paper, the theory is also validated on a system level. A test indicates that the reasonableness and correctness of CySeMoL assessments compare with the reasonableness and correctness of the assessments of a security professional. CySeMoLs utility has been tested in case studies.


Information Management & Computer Security | 2014

Variables influencing information security policy compliance: A systematic review of quantitative studies

Teodor Sommestad; Jonas Hallberg; Kristoffer Lundholm; Johan E. Bengtsson

Purpose – The purpose of this paper is to identify variables that influence compliance with information security policies of organizations and to identify how important these variables are. Design/methodology/approach – A systematic review of empirical studies described in extant literature is performed. This review found 29 studies meeting its inclusion criterion. The investigated variables in these studies and the effect size reported for them were extracted and analysed. Findings – In the 29 studies, more than 60 variables have been studied in relation to security policy compliance and incompliance. Unfortunately, no clear winners can be found among the variables or the theories they are drawn from. Each of the variables only explains a small part of the variation in peoples behaviour and when a variable has been investigated in multiple studies the findings often show a considerable variation. Research limitations/implications – It is possible that the disparate findings of the reviewed studies can b...


conference on advanced information systems engineering | 2010

A Tool for Enterprise Architecture Analysis Using the PRM Formalism

Markus Buschle; Johan Ullberg; Ulrik Franke; Robert Lagerström; Teodor Sommestad

Enterprise architecture advocates for model-based decision-making on enterprise-wide information system issues. In order to provide decision-making support, enterprise architecture models should not only be descriptive but also enable analysis. This paper presents a software tool, currently under development, for the evaluation of enterprise architecture models. In particular, the paper focuses on how to encode scientific theories so that they can be used for model-based analysis and reasoning under uncertainty. The tool architecture is described, and a case study shows how the tool supports the process of enterprise architecture analysis.


hawaii international conference on system sciences | 2009

Cyber Security Risks Assessment with Bayesian Defense Graphs and Architectural Models

Teodor Sommestad; Mathias Ekstedt; Pontus Johnson

To facilitate rational decision making regarding cyber security investments, decision makers need to be able to assess expected losses before and after potential investments. This paper presents a model based assessment framework for analyzing the cyber security provided by different architectural scenarios. The framework uses the Bayesian statistics based Extended Influence Diagrams to express attack graphs and related countermeasures. In this paper it is demonstrated how this structure can be captured in an


conference on advanced information systems engineering | 2011

A Tool for automatic Enterprise Architecture modeling

Markus Buschle; Hannes Holm; Teodor Sommestad; Mathias Ekstedt; Khurram Shahzad

Enterprise Architecture is an approach which aims to provide decision support based on organization-wide models. The creation of these models is however cumbersome as multiple aspects of an organization need to be considered. The Enterprise Architecture approach would be significantly less demanding if data used to create the models could be collected automatically.


Information Management & Computer Security | 2011

A quantitative evaluation of vulnerability scanning

Hannes Holm; Teodor Sommestad; Jonas Almroth; Mats Persson

Purpose – The purpose of this paper is to evaluate if automated vulnerability scanning accurately identifies vulnerabilities in computer networks and if this accuracy is contingent on the platforms used.Design/methodology/approach – Both qualitative comparisons of functionality and quantitative comparisons of false positives and false negatives are made for seven different scanners. The quantitative assessment includes data from both authenticated and unauthenticated scans. Experiments were conducted on a computer network of 28 hosts with various operating systems, services and vulnerabilities. This network was set up by a team of security researchers and professionals.Findings – The data collected in this study show that authenticated vulnerability scanning is usable. However, automated scanning is not able to accurately identify all vulnerabilities present in computer networks. Also, scans of hosts running Windows are more accurate than scans of hosts running Linux.Research limitations/implications – Th...


IEEE Transactions on Power Delivery | 2009

Modeling Security of Power Communication Systems Using Defense Graphs and Influence Diagrams

Teodor Sommestad; Mathias Ekstedt; Lars Nordström

The purpose of this paper is to present a framework for assessing the security of wide-area networks (WANs) used to operate electrical power systems. The framework is based on the formalism influence diagrams and the concept of defense graphs and facilitates a so-called consequence-based analysis of the security problem. The framework is also capable of managing uncertainties, both related to the efficacy of countermeasures and the actual posture of the supervisory control and data-acquisition system. A model over WAN attacks and countermeasures and experiences from applying the framework are described.


hawaii international conference on system sciences | 2012

Effort Estimates for Vulnerability Discovery Projects

Teodor Sommestad; Hannes Holm; Mathias Ekstedt

Security vulnerabilities continue to be an issue in the software field and new severe vulnerabilities are discovered in software products each month. This paper analyzes estimates from domain experts on the amount of effort required for a penetration tester to find a zero-day vulnerability in a software product. Estimates are developed using Cookes classical method for 16 types of vulnerability discovery projects -- each corresponding to a configuration of four security measures. The estimates indicate that, regardless of project type, two weeks of testing are enough to discover a software vulnerability of high severity with fifty percent chance. In some project types an eight-to-five-week is enough to find a zero-day vulnerability with 95 percent probability. While all studied measures increase the effort required for the penetration tester none of them have a striking impact on the effort required to find a vulnerability.

Collaboration


Dive into the Teodor Sommestad's collaboration.

Top Co-Authors

Avatar

Mathias Ekstedt

Royal Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Hannes Holm

Royal Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Jonas Hallberg

Swedish Defence Research Agency

View shared research outputs
Top Co-Authors

Avatar

Pontus Johnson

Royal Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Ulrik Franke

Swedish Institute of Computer Science

View shared research outputs
Top Co-Authors

Avatar

Henrik Karlzén

Swedish Defence Research Agency

View shared research outputs
Top Co-Authors

Avatar

Johan Ullberg

Royal Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Johan E. Bengtsson

Swedish Defence Research Agency

View shared research outputs
Top Co-Authors

Avatar

Lars Nordström

Royal Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Markus Buschle

Royal Institute of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge