Proceedings of the 3rd International Conference on Security of Information and Networks 2010
DOI: 10.1145/1854099.1854130
|View full text |Cite
|
Sign up to set email alerts
|

Cyber security quantification model

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0
1

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 4 publications
0
6
0
1
Order By: Relevance
“…The study enriches the ISSRM domain model with suited metrics towards a measuring framework for security risk management but did not measure dependability metrics. Khan and Hussain (2010) used a unified model for the quantification of cybersecurity that considered most of the parameters and services in cybersecurity, but the model did not capture some important services and cannot apply to a real-life scenario. Joh and Malaiya (2011) formally defines risk measures and examines possible approaches for assessing risk using actual data.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The study enriches the ISSRM domain model with suited metrics towards a measuring framework for security risk management but did not measure dependability metrics. Khan and Hussain (2010) used a unified model for the quantification of cybersecurity that considered most of the parameters and services in cybersecurity, but the model did not capture some important services and cannot apply to a real-life scenario. Joh and Malaiya (2011) formally defines risk measures and examines possible approaches for assessing risk using actual data.…”
Section: Related Workmentioning
confidence: 99%
“…Cyberspace management involves the security of network critical infrastructure through cybersecurity procedures. Cyber Security (CS) is a whole set of procedures and systems protecting networks from intentional and unintentional damages or danger in cyberspace through services like confidentiality, integrity, authentication, and availability (Khan and Hussain, 2010).…”
Section: Introductionmentioning
confidence: 99%
“…Axelrad et al [ 7 ] introduced a Bayesian network model for the motivation and psychology of the malicious insider. Khan and Hussain [ 8 ] established relationships between attack probability and vulnerability. However, the collective influence of attack environment factors on the attack was not revealed.…”
Section: Related Workmentioning
confidence: 99%
“…Shar et al [ 12 ] predicted vulnerabilities with features related to dataflow. Khan and Hussain [ 8 ] stated that it is safe to assume that all these factors have individual linear relationships with the probability of attack. A similar relationship is seen from the scatterplot of the impact of an attack and the environmental factors considered.…”
Section: Prediction Modelmentioning
confidence: 99%
“…Somente três trabalhos envolvem o uso de dados reais. Porém, dentre esses trabalhos, dois deles [19] e [12] não fornecem uma descrição clara dos conjuntos de dados usados, comprometendo a reproducão e comparação dos métodos.…”
Section: Tabela 1: Como As Diferentes Metodologias Para Quantificar Sunclassified