Telemedicine Security Risk Evaluation Using Attack Tree
نویسندگان
چکیده
منابع مشابه
Security Threat Assessment of an Internet Security System Using Attack Tree and Vague Sets
Security threat assessment of the Internet security system has become a greater concern in recent years because of the progress and diversification of information technology. Traditionally, the failure probabilities of bottom events of an Internet security system are treated as exact values when the failure probability of the entire system is estimated. However, security threat assessment when ...
متن کاملSecurity Risk Analysis of Enterprise Networks Using Probabilistic Attack Graphs
(NIST) promotes the U.S. economy and public welfare by providing technical leadership for the nation's measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analysis to advance the development and productive use of information technology. ITL's responsibilities include the development of technical, physical, a...
متن کاملMeasuring Security Risk of Networks Using Attack Graphs
Today’s computer systems face sophisticated attackers who combine multiple vulnerabilities to penetrate networks with devastating impact. The overall security of a network cannot be determined by simply counting the number of vulnerabilities. To accurately assess the security of networked systems, one must understand how vulnerabilities can be combined to stage an attack. We model such composit...
متن کاملSecurity in Telemedicine using DWT-CDCS
Copyright protection of digital media is the very first application that comes to mind for digital watermarking. In the past, duplicating artwork was quite complicated and requires great efforts to create the work looks just like the original. However, in present digital world it is very simple for anyone to duplicate or manipulate digital data. The digital image watermarking allows the waterma...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of the Korea Institute of Information Security and Cryptology
سال: 2015
ISSN: 1598-3986
DOI: 10.13089/jkiisc.2015.25.4.951