Understanding and Developing a Threat Assessment Model

نویسندگان

  • S Vidalis
  • A Blyth
  • Stilianos Vidalis
  • Andrew Blyth
چکیده

The wide development of the mobile Internet technology is creating the opportunity for companies to extensively utilise computer systems for the delivery of services. New business models, which rely on electronic payment systems, are emerging and each one is creating a vulnerability to the Critical National Information Infrastructure (CNII). The opportunity for deploying offensive information warfare tactics against the CNII will be greatly enlarged from the introduction of such systems and the open government policy is greatly affecting the above. Organisations have been forced to allocate considerable resources for protecting their information assets. Unfortunately the opportunity still exists for both protected and unprotected systems to be exploited with catastrophic results. Modern security management methods now acknowledge that most risks cannot be completely eliminated and that they need to be managed in a cost effective manner. This paper will concentrate on the development of a methodology for the assessment and analysis of threat and vulnerabilities within the context of a security risk management. We will discuss a threat and vulnerability assessment method developed with the needs of mobile computer systems in mind. This method consists of four stages: a) Assessment Scope, b) Scenario Construction & Modelling, c) Threat Agent & Vulnerability Analysis, and d) Stakeholder Evaluation. This method actively involves stakeholders and focuses upon a technical, socio-technical and business aspect of the system.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Intelligence analysis and threat assessment: towards a more comprehensive model of threat

A central focus of intelligence is the identification, analysis and assessment of threat. However, as acknowledged by intelligence practitioners, threat assessment lags behind the related field of risk assessment. This paper highlights how definitions of threat currently favoured by intelligence agencies are primarily based on threatening entities alone. Consequently, assessments of threat are ...

متن کامل

A novel ranking method for intuitionistic fuzzy set based on information fusion and application to threat assessment

A novel ranking method based on multi-time information fusion is proposed for intuitionistic fuzzy sets (IFSs) and applied to the threat assessment problem, a multi-attribute decision making (MADM) one. This method integrates a designed intuitionistic fuzzy entropy (IFE), the closeness degree of technique for order preference by similarity to ideal solution (TOPSIS), the decision maker¡¯s (DM¡¯...

متن کامل

Developing a model of influential factors for fraud risk assessment in Iran

Trust among traders is one of the bases of markets mechanism and fraud damages existing trust. Therefore, the deleterious impact of fraud on societies and companies is obvious. When fraud occurs, the society expects auditors to detect and report fraud. Therefore, the role of auditors in countering fraud has become increasingly significant. To detect fraud, auditors need to perform a high-qualit...

متن کامل

Application of Delphi Method and Fuzzy Analytic Hierarchy Process in Modeling Environmental Performance Assessment in Urban Medical Centers

Medical centers (that is, hospitals and clinics) in metropolitan areas produce substantial amounts of hazardous waste in both solid and liquid (wastewater) forms. Unless medical centers manage their waste with appropriate care, the significant hazards posed to urban residents and areas far outweigh the benefits of their services. Therefore, comprehensive environmental management programs need t...

متن کامل

Developing Goodson’s model for rapid performance assessment of emergency department

Over the past years, raising costs of health care in most countries cause to attract more attention to different aspects in the field. One of the best improvement methodologies known in literature is based on lean principles. The main aim of this methodology is to create values in the system by eliminating losses and creating continuous efforts toward improvement. Therefore, by measuring the pe...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002