The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Cyber Security Models
|
Author(s): Norman F. Schneidewind (Naval Postgraduate School, USA)
Copyright: 2007
Pages: 13
Source title:
Cyber Warfare and Cyber Terrorism
Source Author(s)/Editor(s): Lech Janczewski (University of Auckland, New Zealand)and Andrew Colarik (AndrewColarik.com, USA)
DOI: 10.4018/978-1-59140-991-5.ch028
Purchase
|
Abstract
Predictive models for estimating the occurrence of cyber attacks are desperately needed to counteract the growing threat of cyber terrorism. Unfortunately, except to a limited degree, there is no genuine database of attacks, vulnerabilities, consequences, and risks to employ for model development and validation. However, it is still useful to provide definitions, equations, plots, and analyses to answer the “what if” questions concerning potentials attacks. We do this by reasoning about the elements of predictive models and their relationships, which are needed to mirror objects and events in the real world of cyberspace. The application of these models is to provide the user with a vehicle for testing hypotheses about how to respond to a cyber attack before it occurs, using risk, vulnerabilities, time between attacks, and intrusion (number and duration) concepts.
Related Content
Siva Raja Sindiramutty, Noor Zaman Jhanjhi, Chong Eng Tan, Navid Ali Khan, Bhavin Shah, Amaranadha Reddy Manchuri.
© 2024.
58 pages.
|
Imdad Ali Shah, Raja Kumar Murugesan, Samina Rajper.
© 2024.
31 pages.
|
Rana Muhammad Amir Latif, Muhammad Farhan, Navid Ali Khan, R. Sujatha.
© 2024.
33 pages.
|
Imdad Ali Shah, Areesha Sial, Sarfraz Nawaz Brohi.
© 2024.
25 pages.
|
Kassim Kalinaki, Wasswa Shafik, Sarah Namuwaya, Sumaya Namuwaya.
© 2024.
24 pages.
|
Imdad Ali Shah, N. Z. Jhanjhi, Humaira Ashraf.
© 2024.
24 pages.
|
Rida Zehra.
© 2024.
18 pages.
|
|
|