Quantitative security risk assessment of enterprise networks

Protection of enterprise networks from malicious intrusions is critical to the economy and security of our nation. This article gives an overview of the techniques and challenges for security risk analysis of enterprise networks. A standard model for security analysis will enable us to answer questi...

Full description

Main Author: Ou, Xinming, 1975-
Other Authors: Singhal, Anoop, 1958-, SpringerLink (Online service)
Format: eBook
Language: English
Published: New York, NY : Springer, ©2012.
New York, NY : [2012]
Physical Description: 1 online resource (xiii, 28 pages) : illustrations.
Series: SpringerBriefs in computer science.
Subjects:
LEADER 06046cam a2201081 a 4500
001 761199699
003 OCoLC
005 20240223121953.0
006 m o d
007 cr cnu---unuuu
008 111116s2012 nyua ob 000 0 eng d
010 |a 2011941356 
016 7 |a 015979029  |2 Uk 
019 |a 779197101  |a 899741419  |a 985031629  |a 990597385  |a 1005747149  |a 1087477182  |a 1162787014 
020 |a 9781461418603  |q (electronic bk.) 
020 |a 1461418607  |q (electronic bk.) 
020 |z 9781461418597 
020 |z 1461418593 
024 7 |a 10.1007/978-1-4614-1860-3  |2 doi 
035 |a (OCoLC)761199699  |z (OCoLC)779197101  |z (OCoLC)899741419  |z (OCoLC)985031629  |z (OCoLC)990597385  |z (OCoLC)1005747149  |z (OCoLC)1087477182  |z (OCoLC)1162787014 
040 |a GW5XE  |b eng  |e pn  |c GW5XE  |d COO  |d E7B  |d OCLCQ  |d YDXCP  |d BEDGE  |d CGU  |d EBLCP  |d DEBSZ  |d OCLCQ  |d VT2  |d Z5A  |d VGM  |d ESU  |d LIP  |d UNA  |d A7U  |d MYUML  |d OCLCQ  |d IOG  |d N$T  |d BUF  |d OCLCF  |d CEF  |d INT  |d U3W  |d OCLCQ  |d WYU  |d YOU  |d OCLCQ  |d UKAHL  |d OL$  |d OCLCQ  |d WURST  |d OCLCQ  |d AJS  |d OCLCO  |d OCL  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCL  |d OCLCQ  |d OCLCL 
049 |a COM6 
050 4 |a TK5105.59  |b .O9 2012 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
100 1 |a Ou, Xinming,  |d 1975-  |1 https://id.oclc.org/worldcat/entity/E39PCjtdHPBr4rwrJpvXMq47RC. 
245 1 0 |a Quantitative security risk assessment of enterprise networks /  |c Xinming Ou, Anoop Singhal. 
260 |a New York, NY :  |b Springer,  |c ©2012. 
264 1 |a New York, NY :  |b Springer,  |c [2012] 
264 4 |c ©2012. 
300 |a 1 online resource (xiii, 28 pages) :  |b illustrations. 
336 |a text  |b txt  |2 rdacontent. 
337 |a computer  |b c  |2 rdamedia. 
338 |a online resource  |b cr  |2 rdacarrier. 
347 |a text file  |b PDF  |2 rda. 
490 1 |a SpringerBriefs in computer science,  |x 2191-5768. 
588 0 |a Online resource; title from PDF title page (EBSCO, viewed January 10, 2018). 
504 |a Includes bibliographical references. 
505 0 |a Quantitative Security Risk Assessment of Enterprise Networks; Preface; Acknowledgements; Contents; Acronyms; Chapter 1 The Need for Quantifying Security; 1.1 Introduction; 1.2 PastWork in Security Risk Analysis; Chapter 2 Attack Graph Techniques; 2.1 An example scenario; 2.2 Tools for Generating Attack Graphs; Chapter 3 The Common Vulnerability Scoring System (CVSS); 3.1 An Example; Chapter 4 Security Risk Analysis of Enterprise Networks Using Attack Graphs; 4.1 Example 1; Deriving security metrics from attack graphs.; 4.2 Example 2; 4.3 Example 3. 
505 8 |a 4.4 Using risk metrics to prioritize security hardeningChapter 5 Conclusion; References. 
520 |a Protection of enterprise networks from malicious intrusions is critical to the economy and security of our nation. This article gives an overview of the techniques and challenges for security risk analysis of enterprise networks. A standard model for security analysis will enable us to answer questions such as ""are we more secure than yesterday"" or ""how does the security of one network configuration compare with another one"". In this article, we will present a methodology for quantitative security risk analysis that is based on the model of attack graphs and the Common Vulnerability Scorin. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer networks  |x Risk assessment  |x Methodology. 
650 0 |a Cyberinfrastructure  |x Risk assessment  |x Methodology. 
650 0 |a Cyberinfrastructure  |x Security measures. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Réseaux d'ordinateurs  |x Évaluation du risque  |x Méthodologie. 
650 6 |a Cyberinfrastructure  |x Évaluation du risque  |x Méthodologie. 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh. 
650 7 |a Cyberinfrastructure  |x Security measures.  |2 fast. 
650 7 |a Computer networks  |x Security measures.  |2 fast. 
653 0 0 |a computerwetenschappen. 
653 0 0 |a computer sciences. 
653 0 0 |a gegevensbeheer. 
653 0 0 |a data management. 
653 0 0 |a computernetwerken. 
653 0 0 |a computer networks. 
653 0 0 |a betrouwbaarheid. 
653 0 0 |a reliability. 
653 0 0 |a systeemanalyse. 
653 0 0 |a systems analysis. 
653 1 0 |a Information and Communication Technology (General) 
653 1 0 |a Informatie- en communicatietechnologie (algemeen) 
700 1 |a Singhal, Anoop,  |d 1958-  |1 https://id.oclc.org/worldcat/entity/E39PCjrwmpgTcMwFRgJgMCpRTd. 
710 2 |a SpringerLink (Online service) 
776 0 8 |i Print version:  |a Ou, Xinming, 1975-  |t Quantitative security risk assessment of enterprise networks.  |d New York, NY : Springer, ©2012  |w (DLC) 2011941356. 
830 0 |a SpringerBriefs in computer science. 
907 |a .b34951441  |b multi  |c -  |d 120116  |e 240320 
998 |a (3)cue  |a cu  |b 240227  |c m  |d z   |e -  |f eng  |g nyu  |h 0  |i 2 
948 |a MARCIVE Overnight, in 2024.03 
948 |a MARCIVE Comp, in 2022.12 
948 |a MARCIVE Comp, 12/2021 
948 |a MARCIVE Over, 07/2021 
948 |a MARCIVE Comp, 2019.12 
948 |a MARCIVE Comp, 2018.05 
948 |a MARCIVE August, 2017 
948 |a MARCIVE extract Aug, 5 2017 
994 |a 92  |b COM 
995 |a Loaded with m2btab.ltiac in 2024.03 
995 |a Loaded with m2btab.elec in 2024.02 
995 |a Loaded with m2btab.ltiac in 2022.12 
995 |a Loaded with m2btab.ltiac in 2021.12 
995 |a Loaded with m2btab.ltiac in 2021.07 
995 |a Loaded with m2btab.elec in 2021.06 
995 |a Loaded with m2btab.ltiac in 2019.12 
995 |a Loaded with m2btab.ltiac in 2018.06 
995 |a Loaded with m2btab.ltiac in 2017.08 
995 |a Loaded with m2btab.elec in 2016 
995 |a Loaded with m2btab.elec in 2016 
995 |a OCLC offline update by CMU 
999 |e z 
999 |a cue 
989 |d cueme  |e  - -   |f  - -   |g -   |h 0  |i 0  |j 200  |k 240227  |l $0.00  |m    |n  - -   |o -  |p 0  |q 0  |t 0  |x 0  |w SpringerLink  |1 .i150296745  |u http://ezproxy.coloradomesa.edu/login?url=https://link.springer.com/10.1007/978-1-4614-1860-3  |3 SpringerLink  |z Click here for access