Quantifying Integrity Impacts in Security Risk Scoring Models
نویسندگان
چکیده
منابع مشابه
Quantifying Integrity Impacts in Security Risk Scoring Models
Organizations are attacked daily by criminal hackers. Managers need to know what kinds of cyber-attacks they are exposed to, for taking defense activities. Attackers may cause several kinds of damages according to the knowledge they have on organizations’ configuration and of systems’ vulnerabilities. One possible result of attacks is damaging the database. Estimations of attacks’ impacts on da...
متن کاملEvaluating Confidentiality Impact in Security Risk Scoring Models
Risk scoring models assume that confidentiality evaluation is based on user estimations. Confidentiality evaluation incorporates the impacts of various factors including systems' technical configuration, on the processes relating to users' confidentiality. The assumption underlying this research is that system users are not capable of estimating systems' confidentiality since they lack the know...
متن کاملEvaluating Damage Potential in Security Risk Scoring Models
A Continuous Monitoring System (CMS) model is presented, having new improved capabilities. The system is based on the actual real-time configuration of the system. Existing risk scoring models assume damage potential is estimated by systems' owner, thus rejecting the information relying in the technological configuration. The assumption underlying this research is based on users' ability to est...
متن کاملCredit Risk Scoring Models
Credit scoring models play a fundamental role in the risk management practice at most banks. They are used to quantify credit risk at counterparty or transaction level in the different phases of the credit cycle (e.g. application, behavioural, collection models). The credit score empowers users to make quick decisions or even to automate decisions and this is extremely desirable when banks are ...
متن کاملSecurity Risk Scoring Incorporating Computers' Environment
A framework of a Continuous Monitoring System (CMS) is presented, having new improved capabilities. The system uses the actual real-time configuration of the system and environment characterized by a Configuration Management Data Base (CMDB) which includes detailed information of organizational database contents, security and privacy specifications. The Common Vulnerability Scoring Systems' (CV...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Advanced Computer Science and Applications
سال: 2017
ISSN: 2156-5570,2158-107X
DOI: 10.14569/ijacsa.2017.081229