| 000 | 02698nam a22005295i 4500 | ||
|---|---|---|---|
| 001 | 978-1-4614-1860-3 | ||
| 003 | DE-He213 | ||
| 005 | 20140220083733.0 | ||
| 007 | cr nn 008mamaa | ||
| 008 | 111104s2011 xxu| s |||| 0|eng d | ||
| 020 |
_a9781461418603 _9978-1-4614-1860-3 |
||
| 024 | 7 |
_a10.1007/978-1-4614-1860-3 _2doi |
|
| 050 | 4 | _aQA76.9.A25 | |
| 072 | 7 |
_aUR _2bicssc |
|
| 072 | 7 |
_aUTN _2bicssc |
|
| 072 | 7 |
_aCOM053000 _2bisacsh |
|
| 082 | 0 | 4 |
_a005.8 _223 |
| 100 | 1 |
_aOu, Xinming. _eauthor. |
|
| 245 | 1 | 0 |
_aQuantitative Security Risk Assessment of Enterprise Networks _h[electronic resource] / _cby Xinming Ou, Anoop Singhal. |
| 264 | 1 |
_aNew York, NY : _bSpringer New York, _c2011. |
|
| 300 |
_aXIII, 28p. _bonline resource. |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_aonline resource _bcr _2rdacarrier |
||
| 347 |
_atext file _bPDF _2rda |
||
| 490 | 1 |
_aSpringerBriefs in Computer Science, _x2191-5768 |
|
| 505 | 0 | _aThe Need for Quantifying Security -- Attack Graph Techniques -- The Common Vulnerability Scoring System (CVSS) -- Security Risk Analysis of Enterprise Networks Using Attack Graphs -- Conclusion. | |
| 520 | _aProtection of enterprise networks from malicious intrusions is critical to the economy and security of our nation. This article gives an overview of the techniques and challenges for security risk analysis of enterprise networks. A standard model for security analysis will enable us to answer questions such as “are we more secure than yesterday” or “how does the security of one network configuration compare with another one”. In this article, we will present a methodology for quantitative security risk analysis that is based on the model of attack graphs and the Common Vulnerability Scoring System (CVSS). Our techniques analyze all attack paths through a network, for an attacker to reach certain goal(s). | ||
| 650 | 0 | _aComputer science. | |
| 650 | 0 | _aOperating systems (Computers). | |
| 650 | 0 | _aComputer Communication Networks. | |
| 650 | 0 | _aComputer system performance. | |
| 650 | 0 | _aData protection. | |
| 650 | 1 | 4 | _aComputer Science. |
| 650 | 2 | 4 | _aSystems and Data Security. |
| 650 | 2 | 4 | _aComputer Communication Networks. |
| 650 | 2 | 4 | _aPerformance and Reliability. |
| 650 | 2 | 4 | _aSystem Performance and Evaluation. |
| 700 | 1 |
_aSinghal, Anoop. _eauthor. |
|
| 710 | 2 | _aSpringerLink (Online service) | |
| 773 | 0 | _tSpringer eBooks | |
| 776 | 0 | 8 |
_iPrinted edition: _z9781461418597 |
| 830 | 0 |
_aSpringerBriefs in Computer Science, _x2191-5768 |
|
| 856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-1-4614-1860-3 |
| 912 | _aZDB-2-SCS | ||
| 999 |
_c106303 _d106303 |
||