Harnessing GPT-4 for generation of cybersecurity GRC policies: A focus on ransomware attack mitigation
dc.citation.volume | 134 | |
dc.contributor.author | McIntosh T | |
dc.contributor.author | Liu T | |
dc.contributor.author | Susnjak T | |
dc.contributor.author | Alavizadeh H | |
dc.contributor.author | Ng A | |
dc.contributor.author | Nowrozy R | |
dc.contributor.author | Watters P | |
dc.date.accessioned | 2024-10-25T02:24:18Z | |
dc.date.available | 2024-10-25T02:24:18Z | |
dc.date.issued | 2023-11-01 | |
dc.description.abstract | This study investigated the potential of Generative Pre-trained Transformers (GPTs), a state-of-the-art large language model, in generating cybersecurity policies to deter and mitigate ransomware attacks that perform data exfiltration. We compared the effectiveness, efficiency, completeness, and ethical compliance of GPT-generated Governance, Risk and Compliance (GRC) policies, with those from established security vendors and government cybersecurity agencies, using game theory, cost-benefit analysis, coverage ratio, and multi-objective optimization. Our findings demonstrated that GPT-generated policies could outperform human-generated policies in certain contexts, particularly when provided with tailored input prompts. To address the limitations of our study, we conducted our analysis with thorough human moderation, tailored input prompts, and the inclusion of legal and ethical experts. Based on these results, we made recommendations for corporates considering the incorporation of GPT in their GRC policy making. | |
dc.description.confidential | false | |
dc.edition.edition | November 2023 | |
dc.identifier.citation | McIntosh T, Liu T, Susnjak T, Alavizadeh H, Ng A, Nowrozy R, Watters P. (2023). Harnessing GPT-4 for generation of cybersecurity GRC policies: A focus on ransomware attack mitigation. Computers and Security. 134. | |
dc.identifier.doi | 10.1016/j.cose.2023.103424 | |
dc.identifier.eissn | 1872-6208 | |
dc.identifier.elements-type | journal-article | |
dc.identifier.issn | 0167-4048 | |
dc.identifier.number | 103424 | |
dc.identifier.uri | https://mro.massey.ac.nz/handle/10179/71852 | |
dc.language | English | |
dc.publisher | Elsevier B.V. | |
dc.publisher.uri | https://www.sciencedirect.com/science/article/pii/S0167404823003346 | |
dc.relation.isPartOf | Computers and Security | |
dc.rights | (c) 2023 The Author/s | |
dc.rights | CC BY-NC-ND 4.0 | |
dc.rights.uri | https://creativecommons.org/licenses/by-nc-nd/4.0/ | |
dc.subject | GPT | |
dc.subject | Cybersecurity policies | |
dc.subject | Ransomware | |
dc.subject | Policy generation | |
dc.subject | GRC | |
dc.title | Harnessing GPT-4 for generation of cybersecurity GRC policies: A focus on ransomware attack mitigation | |
dc.type | Journal article | |
pubs.elements-id | 480791 | |
pubs.organisational-group | Other |