IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Attack Graphs and Scenario Driven Wireless Computer Network Defense

Attack Graphs and Scenario Driven Wireless Computer Network Defense
View Sample PDF
Author(s): Peter J. Hawrylak (The University of Tulsa, USA), George Louthan (The University of Tulsa, USA), Jeremy Daily (The University of Tulsa, USA), John Hal (The University of Tulsa, USA)and Mauricio Papa (The University of Tulsa, USA)
Copyright: 2014
Pages: 18
Source title: Crisis Management: Concepts, Methodologies, Tools, and Applications
Source Author(s)/Editor(s): Information Resources Management Association (USA)
DOI: 10.4018/978-1-4666-4707-7.ch037

Purchase

View Attack Graphs and Scenario Driven Wireless Computer Network Defense on the publisher's website for pricing and purchasing information.

Abstract

This chapter describes how to use attack graphs to evaluate the security vulnerabilities of an embedded computer network and provides example cases of this technique. Attack graphs are powerful tools available to system administrators to identify and manage vulnerabilities. Attack graphs describe the steps an adversary could take to reach a desired goal and can be analyzed to quantify risk. The systems investigated in this chapter are embedded systems that span hardware, software, and network communication. The example cases studied will be (1) radio frequency identification (RFID), (2) vehicle networks, and (3) the Smart Grid (the next generation power and distribution network in the USA).

Related Content

Christopher Nyakotyo, Pedzisai Goronga. © 2024. 18 pages.
Colleen Halupa. © 2024. 23 pages.
Stefan Handke. © 2024. 14 pages.
Jaime Santos-Reyes, Galdino Santos-Reyes, Ricardo Tejeida-Padilla. © 2024. 19 pages.
Ahmad Kayaly. © 2024. 20 pages.
Elizabeth Stroble. © 2024. 15 pages.
Mubango Hazel, Hlanganipai Ngirande, Khathutshelo Khashane. © 2024. 20 pages.
Body Bottom