Security Risk Analysis based on probability of system failure, attacks and Vulnerabilities

被引:0
|
作者
Kbar, Ghassan [1 ]
机构
[1] Amer Univ Dubai, Dubai, U Arab Emirates
来源
2009 IEEE/ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1 AND 2 | 2009年
关键词
Management security; risk analysis; attacks;
D O I
10.1109/AICCSA.2009.5069434
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network security management plays a crucial role in protecting organization assets and its computer infrastructure. This can be done by identifying the vulnerabilities and developing effective control that reduces the risk of attacks and failures. Network risk assessment is a subjective process that is linked to multiple variables. These variables are associated with the organization assets and their impact on the health of the organization. To preserve the value of these assets, they must be protected from failure or attacks. In addition vulnerability assessment must be undertaken to assess the value of these assets for possible deficiency that would cause successful attacks. The main factors affecting failure are possible of system failure, threats which can be related to internal and external attacks, environmental threat, and process related threats. A risk management methodology is described in this paper to assist managers in evaluating the security risk of their organization. This risk is based on multiple variables that are related to vulnerabilities, probability of failure, and possible attacks caused by threats.
引用
收藏
页码:874 / 879
页数:6
相关论文
共 50 条
  • [1] Security Risk Analysis for Asset in relation to Vulnerability, Probability of Threats and Attacks
    Kbar, Ghassan
    IIT: 2008 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION TECHNOLOGY, 2008, : 16 - 20
  • [2] Analysis of vulnerabilities, attacks, countermeasures and overall risk of the Automatic Dependent Surveillance-Broadcast (ADS-B) system
    Manesh, Mohsen Riahi
    Kaabouch, Naima
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2017, 19 : 16 - 31
  • [3] Robotics cyber security: vulnerabilities, attacks, countermeasures, and recommendations
    Yaacoub, Jean-Paul A.
    Noura, Hassan N.
    Salman, Ola
    Chehab, Ali
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2022, 21 (01) : 115 - 158
  • [4] Robotics cyber security: vulnerabilities, attacks, countermeasures, and recommendations
    Jean-Paul A. Yaacoub
    Hassan N. Noura
    Ola Salman
    Ali Chehab
    International Journal of Information Security, 2022, 21 : 115 - 158
  • [5] A SURVEY OF SECURITY IN ROBOTIC SYSTEMS: VULNERABILITIES, ATTACKS, AND SOLUTIONS
    Archibald, Christopher
    Schwalm, Luke
    Ball, John E.
    INTERNATIONAL JOURNAL OF ROBOTICS & AUTOMATION, 2017, 32 (02): : 151 - 157
  • [6] BLOCKCHAIN APPROACH TO CYBER SECURITY VULNERABILITIES ATTACKS AND POTENTIAL COUNTERMEASURES
    Sambana, Bosubabu
    Ramesh, Yegireddi
    Rao, Molli Srinivasa
    Rao, T. Chalapathi
    Patnaik, N. P. M.
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2020, 14 (01): : 1 - 14
  • [7] Analyzing Security Approaches for Threats,Vulnerabilities, and attacks in an IoT Environment
    Tyagi, Himani
    Kumar, Rajendra
    2021 INTERNATIONAL CONFERENCE ON COMPUTATIONAL PERFORMANCE EVALUATION (COMPE-2021), 2021, : 227 - 233
  • [8] A vulnerability-centric requirements engineering framework: analyzing security attacks, countermeasures, and requirements based on vulnerabilities
    Elahi, Golnaz
    Yu, Eric
    Zannone, Nicola
    REQUIREMENTS ENGINEERING, 2010, 15 (01) : 41 - 62
  • [9] A vulnerability-centric requirements engineering framework: analyzing security attacks, countermeasures, and requirements based on vulnerabilities
    Golnaz Elahi
    Eric Yu
    Nicola Zannone
    Requirements Engineering, 2010, 15 : 41 - 62
  • [10] Risk Analysis of Social System Security Based on Meso-optimum Scale
    Tao, Weidong
    Zou, Kaiqi
    2012 INTERNATIONAL SYMPOSIUM ON INFORMATION SCIENCE AND ENGINEERING (ISISE), 2012, : 240 - 244