2007 IEEE Intelligence and Security Informatics 2007
DOI: 10.1109/isi.2007.379479
|View full text |Cite
|
Sign up to set email alerts
|

Managing Security Threats and Vulnerabilities for Small to Medium Enterprises

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0

Year Published

2010
2010
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 22 publications
(17 citation statements)
references
References 5 publications
0
17
0
Order By: Relevance
“…Secure Socket layer (SSL) is one of the main solutions for MITM, which encrypt the traffic and make it impossible to tamper or modify any of the transferred information between two parties [8]. However, using SSL is not enough because there are ways to fake it (by proxy servers), so that the user think that he have a secure connection while he navigated to a non-SSL site.…”
Section: Man In the Middle Attackmentioning
confidence: 99%
“…Secure Socket layer (SSL) is one of the main solutions for MITM, which encrypt the traffic and make it impossible to tamper or modify any of the transferred information between two parties [8]. However, using SSL is not enough because there are ways to fake it (by proxy servers), so that the user think that he have a secure connection while he navigated to a non-SSL site.…”
Section: Man In the Middle Attackmentioning
confidence: 99%
“…The associated strategizing discourse can be characterized with a simple formula: Risks = Assets × Likelihood , where the two abstract entities on the right-hand side are, when possible, related to BCI and APT, respectively. No attempts are made to enlarge the conceptual scope to more complex models that would be available by introducing the concepts of targets (owners), attackers, countermeasures and vulnerabilities (Onwubiko and Lenaghan, 2007), for instance. While it was possible to approach the abstract concept of a likelihood of a security threat by associating it strictly to APTs, it became necessary during interviewing to further fine-tune the analytical risk formula.…”
Section: Research Approachmentioning
confidence: 99%
“…While the model alone allows to frame the overall comparative approach by turning the attention to differences (Lijphart, 1975; Przeworski and Teune, 1970), the qualitative viewpoint is further enriched by focusing on the subjective perceptions of security (Farahmand et al , 2005) in terms of strategizing (Henfridsson and Lind, 2014; Whittington, 2014). The necessary analytical toolbox is built around sharpening a few of the basic abstractions, such as risks, probabilities, assets and costs (Caddy, 2000; Layton and Watters, 2014; Onwubiko and Lenaghan, 2007). Given this machinery, the paper contributes to the aforementioned literature with fresh theoretical thinking, qualitative but practical market research observations and, last but by no means least, a couple of remarks about potential to increase security among small enterprises.…”
Section: Introductionmentioning
confidence: 99%
“…It is used to minimize or eliminate the probability of a threat exploiting a vulnerability in an asset. • An asset is defined as anything that is of a value and importance to the owner, which includes information, programs, data, network, and communication infrastructures [17].…”
Section: Vulnerabilitymentioning
confidence: 99%