Security Risk Analysis based on probability of system failure, attacks and Vulnerabilities

被引:0
|
作者
Kbar, Ghassan [1 ]
机构
[1] Amer Univ Dubai, Dubai, U Arab Emirates
关键词
Management security; risk analysis; attacks;
D O I
10.1109/AICCSA.2009.5069434
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network security management plays a crucial role in protecting organization assets and its computer infrastructure. This can be done by identifying the vulnerabilities and developing effective control that reduces the risk of attacks and failures. Network risk assessment is a subjective process that is linked to multiple variables. These variables are associated with the organization assets and their impact on the health of the organization. To preserve the value of these assets, they must be protected from failure or attacks. In addition vulnerability assessment must be undertaken to assess the value of these assets for possible deficiency that would cause successful attacks. The main factors affecting failure are possible of system failure, threats which can be related to internal and external attacks, environmental threat, and process related threats. A risk management methodology is described in this paper to assist managers in evaluating the security risk of their organization. This risk is based on multiple variables that are related to vulnerabilities, probability of failure, and possible attacks caused by threats.
引用
收藏
页码:874 / 879
页数:6
相关论文
共 50 条
  • [41] An analysis of Bluetooth security vulnerabilities
    Hager, CT
    Midkiff, SF
    [J]. WCNC 2003: IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE RECORD, VOLS 1-3, 2003, : 1825 - 1831
  • [42] Ontology Model-Based Static Analysis of Security Vulnerabilities
    Yu, Lian
    Wu, Shi-Zhong
    Guo, Tao
    Dong, Guo-Wei
    Wan, Cheng-Cheng
    Jing, Yin-Hang
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, 2011, 7043 : 330 - +
  • [43] A novel approach to cyberspace security situation based on the vulnerabilities analysis
    Hu, Wei
    Li, Hanhua
    Shi, Hanjun
    [J]. WCICA 2006: SIXTH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-12, CONFERENCE PROCEEDINGS, 2006, : 4747 - +
  • [44] Security Algorithm for Intelligent Transport System in Cyber-Physical Systems Perceptive: Attacks, Vulnerabilities, and Countermeasures
    Pavithra R.
    Kaliappan V.
    Rajendar S.
    [J]. SN Computer Science, 4 (5)
  • [45] An Environment-Specific Prioritization Model for Information-Security Vulnerabilities Based on Risk Factor Analysis
    Reyes, Jorge
    Fuertes, Walter
    Arevalo, Paco
    Macas, Mayra
    [J]. ELECTRONICS, 2022, 11 (09)
  • [46] Dynamic Real-Time Analysis of Network Attacks Based on Dynamic Risk Probability Algorithm
    Wang, Chao
    Dong, Jiahan
    Guo, Guangxin
    Li, Bowen
    Ren, Tianyu
    [J]. JOURNAL OF ADVANCED COMPUTATIONAL INTELLIGENCE AND INTELLIGENT INFORMATICS, 2024, 28 (01) : 141 - 149
  • [47] Analysis of vulnerabilities, attacks, countermeasures and overall risk of the Automatic Dependent Surveillance-Broadcast (ADS-B) system
    Manesh, Mohsen Riahi
    Kaabouch, Naima
    [J]. INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2017, 19 : 16 - 31
  • [48] A Systematic Survey on Security in Anonymity Networks: Vulnerabilities, Attacks, Defenses, and Formalization
    Chao, Daichong
    Xu, Dawei
    Gao, Feng
    Zhang, Chuan
    Zhang, Weiting
    Zhu, Liehuang
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2024, 26 (03): : 1775 - 1829
  • [49] RISK-BASED DESIGN BASED ON LIMITING THE PROBABILITY OF SYSTEM FAILURE AT A MINIMUM TOTAL COST
    Todinov, Michael T.
    [J]. RISK MANAGEMENT-AN INTERNATIONAL JOURNAL, 2008, 10 (02): : 104 - 121
  • [50] Advances in IoT Security: Vulnerabilities, Enabled Criminal Services, Attacks, and Countermeasures
    Siwakoti, Yuba Raj
    Bhurtel, Manish
    Rawat, Danda B. B.
    Oest, Adam
    Johnson, R. C.
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (13) : 11224 - 11239