Reducing Threats by Using Bayesian Networks to Prioritize and Combine Defense in Depth Security Measures

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Threats and Security Measures for Systems Using Mobile Agents

The main disadvantage of using the mobile agents is that they are vulnerable to attacks from di¤erent entities on the network like the host or another agent itself. The agents move around in the network from one host to other. While on transit they might be subject to tampering. When the agent is executing on a host, it is at total mercy of that host. The malicious hosts can tamper with the pri...

متن کامل

Reducing the Security Threats to 2.5G and 3G Wireless Applications

Introduction..................................................................... Security Strata................................................................. Low-Level Security Needs.......................................... Mid-Level Security Needs .......................................... High-Level Security Needs......................................... A Security Platform................

متن کامل

Threats and Security using Trust Techniques in Wireless Sensor Networks

Wireless Sensor Networks are implementing on large scale in real time environments due to its incredible uses in real life. Wireless Sensor Networks don’t need human interference for its working so they can place where human cannot reach easily. As sensor nodes are placed in an open and insecure environment, they are prone to security attacks by adversaries. So, the security is an impo rtant is...

متن کامل

Wireless LAN Security Defense In Depth

A lot has been said about wireless networking in recent years especially on the wireless LAN. More importantly, it has changed the way people think about wireless networks. Used to be seen as expensive technology for individuals, wireless LAN can now be seen not only in enterprise networks but also at public areas like the airport, hotels, coffee shops and also in shopping malls. This increasin...

متن کامل

The Challenges and Strategic Imperatives of Nigeria’s Defense and Internal Security Measures since the Fourth Republic

The year 1999 marks a remarkable turnaround in Nigeria’s history and bid for global reckoning as a democratic nation having grappled with a sustained military rule for many decades after her independence. However, with the country’s return to democratic rule, many teething problems evolved which of course is not strange to young and emerging democracies such as Nigeria’s particularly after many...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Information Security

سال: 2020

ISSN: 2153-1234,2153-1242

DOI: 10.4236/jis.2020.113008