Narrow your search

Library

KU Leuven (2)

Odisee (2)

Thomas More Kempen (2)

Thomas More Mechelen (2)

UCLL (2)

ULB (2)

ULiège (2)

VIVES (2)


Resource type

book (2)


Language

English (2)


Year
From To Submit

2011 (2)

Listing 1 - 2 of 2
Sort by

Book
Quantitative Security Risk Assessment of Enterprise Networks
Authors: ---
ISBN: 1461418593 1461418607 Year: 2011 Publisher: New York, NY : Springer New York : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Protection of enterprise networks from malicious intrusions is critical to the economy and security of our nation. This article gives an overview of the techniques and challenges for security risk analysis of enterprise networks. A standard model for security analysis will enable us to answer questions such as “are we more secure than yesterday” or “how does the security of one network configuration compare with another one”. In this article, we will present a methodology for quantitative security risk analysis that is based on the model of attack graphs and the Common Vulnerability Scoring System (CVSS). Our techniques analyze all attack paths through a network, for an attacker to reach certain goal(s).

Keywords

Computer networks --- Cyberinfrastructure --- Cyber-based information systems --- Cyber-infrastructure --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Computer network security --- Network security, Computer --- Security of computer networks --- Security measures. --- Risk assessment --- Methodology. --- Computer science. --- Computer software --- Computer communication systems. --- Computer system failures. --- Computer security. --- Computer Science. --- Systems and Data Security. --- Computer Communication Networks. --- Performance and Reliability. --- System Performance and Evaluation. --- Reusability. --- Electronic data processing --- Information technology --- Computer systems --- Distributed databases --- High performance computing --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Network computers --- Computer security --- Distributed processing --- Operating systems (Computers). --- Computer system performance. --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Computer privacy --- Computer system security --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Operating systems --- Protection --- Security measures --- Computer software—Reusability. --- Computer failures --- Computer malfunctions --- Failure of computer systems --- System failures (Engineering) --- Fault-tolerant computing --- Failures


Book
Critical Infrastructure Protection V : 5th IFIP WG 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2011, Hanover, NH, USA, March 23-25, 2011, Revised Selected Papers
Authors: --- --- ---
ISBN: 3642248632 3642248640 Year: 2011 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The information infrastructure---comprising computers, embedded devices, networks and software systems---is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous materials, agriculture, food, water, public health, emergency services, transportation, postal and shipping, government and defense. Global business and industry, governments, indeed society itself, cannot function effectively if major components of the critical information infrastructure are degraded, disabled or destroyed. Critical Infrastructure Protection V describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: Themes and Issues, Control Systems Security, Infrastructure Security, and Infrastructure Modeling and Simulation. This book is the 5th volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of 14 edited papers from the 5th Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, held at Dartmouth College, Hanover, New Hampshire, USA in the spring of 2011. Critical Infrastructure Protection V is an important resource for researchers, faculty members and graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security. Jonathan Butts is an Assistant Professor of Computer Science at the Air Force Institute of Technology, Wright-Patterson Air Force Base, Ohio, USA. Sujeet Shenoi is the F.P. Walter Professor of Computer Science at the University of Tulsa, Tulsa, Oklahoma, USA.

Keywords

Electrical & Computer Engineering --- Engineering & Applied Sciences --- Computer Science --- Telecommunications --- Computer networks --- Computer security --- Information networks --- Cyberinfrastructure --- Security measures --- Cyber-based information systems --- Cyber-infrastructure --- Automated information networks --- Networks, Information --- Computer science. --- Computer security. --- Data encryption (Computer science). --- Algorithms. --- Computers and civilization. --- Management information systems. --- Computer Science. --- Systems and Data Security. --- Management of Computing and Information Systems. --- Data Encryption. --- Computers and Society. --- Algorithm Analysis and Problem Complexity. --- Information Systems Applications (incl. Internet). --- Information services --- Information storage and retrieval systems --- Electronic data processing --- Information technology --- Computer systems --- Distributed databases --- High performance computing --- Distributed processing --- Information Systems. --- Computer software. --- Cryptology. --- Software, Computer --- Informatics --- Science --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer privacy --- Computer system security --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Algorism --- Algebra --- Arithmetic --- Civilization and computers --- Civilization --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Foundations --- Communication systems --- Data protection. --- Cryptography. --- Data and Information Security. --- IT Operations. --- Computer and Information Systems Applications. --- Management. --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Data governance --- Data regulation --- Personal data protection --- Protection, Data

Listing 1 - 2 of 2
Sort by