2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277)
DOI: 10.1109/milcom.2001.985765
|View full text |Cite
|
Sign up to set email alerts
|

Defense-in-depth revisited: qualitative risk analysis methodology for complex network-centric operations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 30 publications
(18 citation statements)
references
References 1 publication
0
18
0
Order By: Relevance
“…The defence-in-depth strategy delivers security at different levels of protection and implementation as discussed in [33], [34], and [35].Preparing for zero-day exploits and possible cyber-warfare requires a strategic plan, which must be implemented at different phases of the security architecture of every nation-state that is keen on a secure cyberspace. Different levels of security as shown in Figure 5implies protection at different layers.…”
Section: National Readiness Through Defence-in-depthmentioning
confidence: 99%
“…The defence-in-depth strategy delivers security at different levels of protection and implementation as discussed in [33], [34], and [35].Preparing for zero-day exploits and possible cyber-warfare requires a strategic plan, which must be implemented at different phases of the security architecture of every nation-state that is keen on a secure cyberspace. Different levels of security as shown in Figure 5implies protection at different layers.…”
Section: National Readiness Through Defence-in-depthmentioning
confidence: 99%
“…One uses the same system of categorization as described for ISM above (Alberts et al, 2003;Bass & Robichaux, 2001;Landoll & Landoll, 2005;Lichtenstein, 1996;Visintine, 2003). Organizations must identify all information assets in the scoped system to inform accurate decisions in the future (Standards Australia, 2004a).…”
Section: Understanding the Significance Of Asset Identificationmentioning
confidence: 99%
“…Based on the three basic factors that define risk (i.e., Criticality, Vulnerability, Threat [5]), the potential attacks against AWMN are presented and analyzed [6].…”
Section: Possible Attacks Against Awmnmentioning
confidence: 99%