eTVRA, a threat, vulnerability and risk assessment method and tool for eEurope

被引:0
|
作者
Rossebo, Judith E. Y. [1 ]
Cadzow, Scott [2 ]
Sijben, Paul [3 ]
机构
[1] NTNU, Dept Telemat, Telenor R&I, N-1331 Fornebu, Norway
[2] Cadzow Commun C3L, Sawbridge CM21 9NP, England
[3] EemValley Technol, NL-3822 CC Utrecht, Netherlands
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The telecommunications environment is evolving into Next Generation Networks (NGN). On an NGN, telecommunications services are recreated on IP networks, this creates a demand on standardization bodies to adapt and meet the needs of these emerging networks. Securing the service environment for eBusiness and the underlying network are crucial areas cited in the eEurope action plan [1]. Standardization provides an important means for securing the NGN and establishing trust in its services and infrastructure in order to enable the development of modem public services. In response to this, we have developed a threat, vulnerability and risk assessment (eTVRA) method and tool for use in standardisation. Using the eTVRA method and tool, the threats to NGNs can be analyzed and a set of recommended countermeasures identified that when implemented will reduce the overall risk to users of NGNs. In this paper we present the eTVRA method and tool along with the results of its application to the use of Enhanced Number (ENUM) [2] and SIP [17] in the NGN.
引用
收藏
页码:925 / +
页数:2
相关论文
共 50 条
  • [1] eTVRA, a threat, vulnerability and risk assessment tool for eEurope
    Rossebo, Judith E. Y.
    Cadzow, Scott
    Sijben, Paul
    [J]. TRUST MANAGEMENT, PROCEEDINGS, 2006, 3986 : 467 - 471
  • [2] Threat/risk assessment tool to assess vulnerability of Polish cities to Russian attacks
    Galar, Zbigniew
    Sadowski, Adam
    [J]. DEFENCE AND SECURITY ANALYSIS, 2023, 39 (01): : 111 - 117
  • [3] Threat and vulnerability risk assessment for the insurance industry
    Trainor, T
    Caprari, K
    Green, C
    Roth, J
    Unger, C
    [J]. Managing in a Dangerous World: TWENTY-FIVE YEARS OF TECHNICAL CONFERENCES: BRIDGING BETWEEN TECHNOLOGY AND MANAGEMENT, 2004, : 227 - 234
  • [4] CYBER SECURITY: THREAT IDENTIFICATION, RISK AND VULNERABILITY ASSESSMENT
    Umberger, Harold
    Gheorghe, Adrian
    [J]. ENERGY SECURITY: INTERNATIONAL AND LOCAL ISSUES, THEORETICAL PERSPECTIVES, AND CRITICAL ENERGY INFRASTRUCTURES, 2008, : 247 - 269
  • [5] Construction of information network vulnerability threat assessment model for CPS risk assessment
    Xiong, Juxia
    Wu, Jinzhao
    [J]. COMPUTER COMMUNICATIONS, 2020, 155 : 197 - 204
  • [6] Risk Assessment Tool for Operation: from Threat Models to Risk Indicators
    Vefsnmo, Hanne
    Kjolle, Gerd
    Jakobsen, Sigurd H.
    Ciapessoni, Emanuele
    Cirio, Diego
    Pitto, Andrea
    [J]. 2015 IEEE EINDHOVEN POWERTECH, 2015,
  • [7] Threat and vulnerability risk assessment for existing subway stations: A simplified approach
    Avci, Onur
    Ozbulut, Osman
    [J]. CASE STUDIES ON TRANSPORT POLICY, 2018, 6 (04) : 663 - 673
  • [8] A new method for vulnerability and risk assessment of IoT
    Arat, Ferhat
    Akleylek, Sedat
    [J]. COMPUTER NETWORKS, 2023, 237
  • [9] Semi-Automated Threat, Vulnerability & Risk Assessment (TVRA) for Medical Devices
    Moukafih, Nabil
    Zhang, Hongsen
    Epiphaniou, Gregory
    Maple, Carsten
    Taylor, Steve
    Carmichael, Laura
    [J]. 17TH ACM INTERNATIONAL CONFERENCE ON PERVASIVE TECHNOLOGIES RELATED TO ASSISTIVE ENVIRONMENTS, PETRA 2024, 2024, : 687 - 693
  • [10] Robust Cyber-threat and Vulnerability Information Analyzer for Dynamic Risk Assessment
    Malik, Adeel A.
    Tosh, Deepak K.
    [J]. 2021 IEEE INTERNATIONAL MEDITERRANEAN CONFERENCE ON COMMUNICATIONS AND NETWORKING (IEEE MEDITCOM 2021), 2021, : 168 - 173