Security Risk Analysis for Asset in relation to Vulnerability, Probability of Threats and Attacks

被引:0
|
作者
Kbar, Ghassan
机构
关键词
Security Management; Risk Analysis; Attacks;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Network security management plays a crucial role in protecting organization assets and its computer infrastructure by identifying an effective control that reduces the risk of attacks and failures. Network risk assessment is a subjective process that is affected by multiple distinctive variables. These variables are associated with the organization assets and their impact on the health of the organization. To preserve tire value of these assets, they must be protected from failure or attacks. In addition vulnerability assessment must be undertaken to assess the value of these assets,for possible deficiency that would cause successful attacks. The main factors affecting failure are threats which can include threat of attack, environmental threat, and process related threats. On the other hand, preventing attacks on these assets would reduce the risk of failure and consequently maintain the health of the organization. A risk assessment methodology is described in this paper to assist managers in evaluating the security risk of their organization which is based on the identified variables related to vulnerabilities, threats, and possible attacks.
引用
收藏
页码:16 / 20
页数:5
相关论文
共 50 条
  • [1] Mobile Multimedia Broadcasting Vulnerability Threats, Attacks and Security Solutions
    Sher, Muhammad
    Magedanz, Thomas
    [J]. MWCN 07: PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON MOBILE AND WIRELESS COMMUNICATION NETWORKS, 2007, : 56 - 60
  • [2] SAVIOR Security Analytics on Asset Vulnerability for Information Abstraction and Risk Analysis
    Flanagan, Kieran
    Fallon, Enda
    Awad, Abir
    Connolly, Paul
    [J]. 2016 UKSIM-AMSS 18TH INTERNATIONAL CONFERENCE ON COMPUTER MODELLING AND SIMULATION (UKSIM), 2016, : 9 - 15
  • [4] Security Risk Analysis based on probability of system failure, attacks and Vulnerabilities
    Kbar, Ghassan
    [J]. 2009 IEEE/ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1 AND 2, 2009, : 874 - 879
  • [5] SECURITY THREATS AND ATTACKS IN CLOUD
    Mohammed, Asma
    Al Khathami, Jamilah
    Alhakami, Wajdi
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2021, 21 (01): : 184 - 191
  • [6] Improved Classification and Framework Association of Security Vulnerability, Threats and Attacks in Wireless Sensor Networks
    Ashraf, Adnan
    Rajput, AbdulRauf
    Mussadiq, Marvie
    Chowdhry, Bhawani S.
    Hashmani, Manzoor
    [J]. COMMUNICATIONS INFRASTRUCTURE: SYSTEMS AND APPLICATIONS IN EUROPE, 2009, 16 : 269 - 274
  • [7] Analysis of Security Threats and Vulnerability for Cyber-physical Systems
    Gao, Yang
    Peng, Yong
    Xie, Feng
    Zhao, Wei
    Wang, Dejin
    Han, Xuefeng
    Lug, Tianbo
    Lie, Zhao
    [J]. 2013 3RD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), 2013, : 50 - 55
  • [8] Cyber security vulnerability analysis: An asset-based approach
    Baybutt, P
    [J]. PROCESS SAFETY PROGRESS, 2003, 22 (04) : 220 - 228
  • [9] Information Security Threats: A Comparative Analysis of Impact, Probability, and Preparedness
    Sumner, Mary
    [J]. INFORMATION SYSTEMS MANAGEMENT, 2009, 26 (01) : 2 - 12
  • [10] Fuzzy risk analysis of computer security threats
    Yu, Yingbing
    Shindhelm, Art
    [J]. 2005 International Symposium on Computer Science and Technology, Proceedings, 2005, : 1 - 8