Quantitative security risk assessment of enterprise networks
Protection of enterprise networks from malicious intrusions is critical to the economy and security of our nation. This article gives an overview of the techniques and challenges for security risk analysis of enterprise networks. A standard model for security analysis will enable us to answer questi...
Main Author: | Ou, Xinming, 1975- |
---|---|
Other Authors: | Singhal, Anoop, 1958-, SpringerLink (Online service) |
Format: | eBook |
Language: | English |
Published: |
New York, NY :
Springer,
©2012.
New York, NY : [2012] |
Physical Description: |
1 online resource (xiii, 28 pages) : illustrations. |
Series: |
SpringerBriefs in computer science.
|
Subjects: |
LEADER | 06046cam a2201081 a 4500 | ||
---|---|---|---|
001 | 761199699 | ||
003 | OCoLC | ||
005 | 20240223121953.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 111116s2012 nyua ob 000 0 eng d | ||
010 | |a 2011941356 | ||
016 | 7 | |a 015979029 |2 Uk | |
019 | |a 779197101 |a 899741419 |a 985031629 |a 990597385 |a 1005747149 |a 1087477182 |a 1162787014 | ||
020 | |a 9781461418603 |q (electronic bk.) | ||
020 | |a 1461418607 |q (electronic bk.) | ||
020 | |z 9781461418597 | ||
020 | |z 1461418593 | ||
024 | 7 | |a 10.1007/978-1-4614-1860-3 |2 doi | |
035 | |a (OCoLC)761199699 |z (OCoLC)779197101 |z (OCoLC)899741419 |z (OCoLC)985031629 |z (OCoLC)990597385 |z (OCoLC)1005747149 |z (OCoLC)1087477182 |z (OCoLC)1162787014 | ||
040 | |a GW5XE |b eng |e pn |c GW5XE |d COO |d E7B |d OCLCQ |d YDXCP |d BEDGE |d CGU |d EBLCP |d DEBSZ |d OCLCQ |d VT2 |d Z5A |d VGM |d ESU |d LIP |d UNA |d A7U |d MYUML |d OCLCQ |d IOG |d N$T |d BUF |d OCLCF |d CEF |d INT |d U3W |d OCLCQ |d WYU |d YOU |d OCLCQ |d UKAHL |d OL$ |d OCLCQ |d WURST |d OCLCQ |d AJS |d OCLCO |d OCL |d OCLCO |d OCLCQ |d OCLCO |d OCLCL |d OCLCQ |d OCLCL | ||
049 | |a COM6 | ||
050 | 4 | |a TK5105.59 |b .O9 2012 | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 0 | 4 | |a 005.8 |2 23 |
100 | 1 | |a Ou, Xinming, |d 1975- |1 https://id.oclc.org/worldcat/entity/E39PCjtdHPBr4rwrJpvXMq47RC. | |
245 | 1 | 0 | |a Quantitative security risk assessment of enterprise networks / |c Xinming Ou, Anoop Singhal. |
260 | |a New York, NY : |b Springer, |c ©2012. | ||
264 | 1 | |a New York, NY : |b Springer, |c [2012] | |
264 | 4 | |c ©2012. | |
300 | |a 1 online resource (xiii, 28 pages) : |b illustrations. | ||
336 | |a text |b txt |2 rdacontent. | ||
337 | |a computer |b c |2 rdamedia. | ||
338 | |a online resource |b cr |2 rdacarrier. | ||
347 | |a text file |b PDF |2 rda. | ||
490 | 1 | |a SpringerBriefs in computer science, |x 2191-5768. | |
588 | 0 | |a Online resource; title from PDF title page (EBSCO, viewed January 10, 2018). | |
504 | |a Includes bibliographical references. | ||
505 | 0 | |a Quantitative Security Risk Assessment of Enterprise Networks; Preface; Acknowledgements; Contents; Acronyms; Chapter 1 The Need for Quantifying Security; 1.1 Introduction; 1.2 PastWork in Security Risk Analysis; Chapter 2 Attack Graph Techniques; 2.1 An example scenario; 2.2 Tools for Generating Attack Graphs; Chapter 3 The Common Vulnerability Scoring System (CVSS); 3.1 An Example; Chapter 4 Security Risk Analysis of Enterprise Networks Using Attack Graphs; 4.1 Example 1; Deriving security metrics from attack graphs.; 4.2 Example 2; 4.3 Example 3. | |
505 | 8 | |a 4.4 Using risk metrics to prioritize security hardeningChapter 5 Conclusion; References. | |
520 | |a Protection of enterprise networks from malicious intrusions is critical to the economy and security of our nation. This article gives an overview of the techniques and challenges for security risk analysis of enterprise networks. A standard model for security analysis will enable us to answer questions such as ""are we more secure than yesterday"" or ""how does the security of one network configuration compare with another one"". In this article, we will present a methodology for quantitative security risk analysis that is based on the model of attack graphs and the Common Vulnerability Scorin. | ||
650 | 0 | |a Computer networks |x Security measures. | |
650 | 0 | |a Computer networks |x Risk assessment |x Methodology. | |
650 | 0 | |a Cyberinfrastructure |x Risk assessment |x Methodology. | |
650 | 0 | |a Cyberinfrastructure |x Security measures. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 6 | |a Réseaux d'ordinateurs |x Évaluation du risque |x Méthodologie. | |
650 | 6 | |a Cyberinfrastructure |x Évaluation du risque |x Méthodologie. | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh. | |
650 | 7 | |a Cyberinfrastructure |x Security measures. |2 fast. | |
650 | 7 | |a Computer networks |x Security measures. |2 fast. | |
653 | 0 | 0 | |a computerwetenschappen. |
653 | 0 | 0 | |a computer sciences. |
653 | 0 | 0 | |a gegevensbeheer. |
653 | 0 | 0 | |a data management. |
653 | 0 | 0 | |a computernetwerken. |
653 | 0 | 0 | |a computer networks. |
653 | 0 | 0 | |a betrouwbaarheid. |
653 | 0 | 0 | |a reliability. |
653 | 0 | 0 | |a systeemanalyse. |
653 | 0 | 0 | |a systems analysis. |
653 | 1 | 0 | |a Information and Communication Technology (General) |
653 | 1 | 0 | |a Informatie- en communicatietechnologie (algemeen) |
700 | 1 | |a Singhal, Anoop, |d 1958- |1 https://id.oclc.org/worldcat/entity/E39PCjrwmpgTcMwFRgJgMCpRTd. | |
710 | 2 | |a SpringerLink (Online service) | |
776 | 0 | 8 | |i Print version: |a Ou, Xinming, 1975- |t Quantitative security risk assessment of enterprise networks. |d New York, NY : Springer, ©2012 |w (DLC) 2011941356. |
830 | 0 | |a SpringerBriefs in computer science. | |
907 | |a .b34951441 |b multi |c - |d 120116 |e 240320 | ||
998 | |a (3)cue |a cu |b 240227 |c m |d z |e - |f eng |g nyu |h 0 |i 2 | ||
948 | |a MARCIVE Overnight, in 2024.03 | ||
948 | |a MARCIVE Comp, in 2022.12 | ||
948 | |a MARCIVE Comp, 12/2021 | ||
948 | |a MARCIVE Over, 07/2021 | ||
948 | |a MARCIVE Comp, 2019.12 | ||
948 | |a MARCIVE Comp, 2018.05 | ||
948 | |a MARCIVE August, 2017 | ||
948 | |a MARCIVE extract Aug, 5 2017 | ||
994 | |a 92 |b COM | ||
995 | |a Loaded with m2btab.ltiac in 2024.03 | ||
995 | |a Loaded with m2btab.elec in 2024.02 | ||
995 | |a Loaded with m2btab.ltiac in 2022.12 | ||
995 | |a Loaded with m2btab.ltiac in 2021.12 | ||
995 | |a Loaded with m2btab.ltiac in 2021.07 | ||
995 | |a Loaded with m2btab.elec in 2021.06 | ||
995 | |a Loaded with m2btab.ltiac in 2019.12 | ||
995 | |a Loaded with m2btab.ltiac in 2018.06 | ||
995 | |a Loaded with m2btab.ltiac in 2017.08 | ||
995 | |a Loaded with m2btab.elec in 2016 | ||
995 | |a Loaded with m2btab.elec in 2016 | ||
995 | |a OCLC offline update by CMU | ||
999 | |e z | ||
999 | |a cue | ||
989 | |d cueme |e - - |f - - |g - |h 0 |i 0 |j 200 |k 240227 |l $0.00 |m |n - - |o - |p 0 |q 0 |t 0 |x 0 |w SpringerLink |1 .i150296745 |u http://ezproxy.coloradomesa.edu/login?url=https://link.springer.com/10.1007/978-1-4614-1860-3 |3 SpringerLink |z Click here for access |