Quantifying Integrity Impacts in Security Risk Scoring Models

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Quantifying Integrity Impacts in Security Risk Scoring Models

Organizations are attacked daily by criminal hackers. Managers need to know what kinds of cyber-attacks they are exposed to, for taking defense activities. Attackers may cause several kinds of damages according to the knowledge they have on organizations’ configuration and of systems’ vulnerabilities. One possible result of attacks is damaging the database. Estimations of attacks’ impacts on da...

متن کامل

Evaluating Confidentiality Impact in Security Risk Scoring Models

Risk scoring models assume that confidentiality evaluation is based on user estimations. Confidentiality evaluation incorporates the impacts of various factors including systems' technical configuration, on the processes relating to users' confidentiality. The assumption underlying this research is that system users are not capable of estimating systems' confidentiality since they lack the know...

متن کامل

Evaluating Damage Potential in Security Risk Scoring Models

A Continuous Monitoring System (CMS) model is presented, having new improved capabilities. The system is based on the actual real-time configuration of the system. Existing risk scoring models assume damage potential is estimated by systems' owner, thus rejecting the information relying in the technological configuration. The assumption underlying this research is based on users' ability to est...

متن کامل

Credit Risk Scoring Models

Credit scoring models play a fundamental role in the risk management practice at most banks. They are used to quantify credit risk at counterparty or transaction level in the different phases of the credit cycle (e.g. application, behavioural, collection models). The credit score empowers users to make quick decisions or even to automate decisions and this is extremely desirable when banks are ...

متن کامل

Security Risk Scoring Incorporating Computers' Environment

A framework of a Continuous Monitoring System (CMS) is presented, having new improved capabilities. The system uses the actual real-time configuration of the system and environment characterized by a Configuration Management Data Base (CMDB) which includes detailed information of organizational database contents, security and privacy specifications. The Common Vulnerability Scoring Systems' (CV...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Advanced Computer Science and Applications

سال: 2017

ISSN: 2156-5570,2158-107X

DOI: 10.14569/ijacsa.2017.081229