Security Risk Analysis based on probability of system failure, attacks and Vulnerabilities

被引:0
|
作者
Kbar, Ghassan [1 ]
机构
[1] Amer Univ Dubai, Dubai, U Arab Emirates
关键词
Management security; risk analysis; attacks;
D O I
10.1109/AICCSA.2009.5069434
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network security management plays a crucial role in protecting organization assets and its computer infrastructure. This can be done by identifying the vulnerabilities and developing effective control that reduces the risk of attacks and failures. Network risk assessment is a subjective process that is linked to multiple variables. These variables are associated with the organization assets and their impact on the health of the organization. To preserve the value of these assets, they must be protected from failure or attacks. In addition vulnerability assessment must be undertaken to assess the value of these assets for possible deficiency that would cause successful attacks. The main factors affecting failure are possible of system failure, threats which can be related to internal and external attacks, environmental threat, and process related threats. A risk management methodology is described in this paper to assist managers in evaluating the security risk of their organization. This risk is based on multiple variables that are related to vulnerabilities, probability of failure, and possible attacks caused by threats.
引用
收藏
页码:874 / 879
页数:6
相关论文
共 50 条
  • [1] Security Analysis of DeFi: Vulnerabilities, Attacks and Advances
    Li, Wenkai
    Bu, Jiuyang
    Li, Xiaoqi
    Chen, Xianyi
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN (BLOCKCHAIN 2022), 2022, : 488 - 493
  • [2] Security Risk Analysis for Asset in relation to Vulnerability, Probability of Threats and Attacks
    Kbar, Ghassan
    [J]. IIT: 2008 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION TECHNOLOGY, 2008, : 16 - 20
  • [3] A software security assessment system based on analysis of vulnerabilities
    Sui, Chenmeng
    Liu, Yanzhao
    Liu, Yun
    [J]. Journal of Convergence Information Technology, 2012, 7 (06) : 211 - 219
  • [4] Analysis of SCADA System Vulnerabilities to DDoS Attacks
    Markovic-Petrovic, Jasna D.
    Stojanovic, Mirjana D.
    [J]. 2013 11TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS IN MODERN SATELLITE, CABLE AND BROADCASTING SERVICES (TELSIKS), VOLS 1 AND 2, 2013, : 591 - 594
  • [5] A Survey on Security Issues, Vulnerabilities and Attacks in Android based Smartphone
    Hur, Jalal B.
    Shamsi, Jawwad A.
    [J]. 2017 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES (ICICT), 2017, : 40 - 46
  • [6] Security of the Internet of Things: Vulnerabilities, Attacks, and Countermeasures
    Butun, Ismail
    Osterberg, Patrik
    Song, Houbing
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (01): : 616 - 644
  • [7] Security of Industrial Robots: Vulnerabilities, Attacks, and Mitigations
    Pu, Hongyi
    He, Liang
    Cheng, Peng
    Sun, Mingyang
    Chen, Jiming
    [J]. IEEE NETWORK, 2023, 37 (01): : 111 - 117
  • [8] Virtualized Network Functions Security Attacks and Vulnerabilities
    Aljuhani, Ahamed
    Alharbi, Talal
    [J]. 2017 IEEE 7TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE IEEE CCWC-2017, 2017,
  • [9] SECURITY SYSTEM VULNERABILITIES
    Constantinescu, Nicolae
    [J]. PROCEEDINGS OF THE ROMANIAN ACADEMY SERIES A-MATHEMATICS PHYSICS TECHNICAL SCIENCES INFORMATION SCIENCE, 2012, 13 (02): : 175 - 179
  • [10] Research of Information System Security Risk Management based on Probability Model and Security Entropy
    Du, Jiawei
    Zhou, Ying
    Guo, Ronghua
    Zhang, Xing
    Suo, Guowei
    [J]. INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND APPLICATION ENGINEERING (CSAE), 2017, 190 : 414 - 420