Flow-Graph and Markovian Methods for Cyber Security Analysis
Autor: | Kouroush Jenab, Kim LaFevor, Sam Khoury |
---|---|
Rok vydání: | 2016 |
Předmět: |
Information Systems and Management
Cloud computing security Computer science 05 social sciences 050301 education 02 engineering and technology Computer security model Asset (computer security) Computer security computer.software_genre Security information and event management Computer Science Applications Management Information Systems Security service 0202 electrical engineering electronic engineering information engineering Security through obscurity Security convergence 020201 artificial intelligence & image processing 0503 education computer Countermeasure (computer) |
Zdroj: | International Journal of Enterprise Information Systems. 12:59-84 |
ISSN: | 1548-1123 1548-1115 |
DOI: | 10.4018/ijeis.2016010104 |
Popis: | A flow-graph depicts the interrelationships among cyber security and security threats/incidents (i.e., internal, external, and accidental). Using a flow-graph, the manner in which security threats may affect systems can be investigated. This paper reports analytical approaches to analyze time to security threats and probability of security threat occurrence. Considering embedded threat detection functions in a safe-guard unit, the proposed approaches use the flow-graph concept, and Markovian method to calculate time to security threat occurrence and its probability. The threat detection functions are featured by incident detection and recovery mechanisms. The results of this study can be used by all parties (public and private sector organizations, service providers, IT, and insurance companies) to better deal with cyber security issues with respect to utilizing technology, investment, and insurance. An illustrative example is demonstrated to present the application of the approach. |
Databáze: | OpenAIRE |
Externí odkaz: |