메뉴 건너뛰기




Volumn 45, Issue 2, 2004, Pages 36-43

Assessing & quantifying the loss of network intrusion

Author keywords

Bayesian influence diagram; Computer misuse; Computer security; Decision tree; Network security; Network security breach

Indexed keywords

BAYESIAN INFLUENCE DIAGRAM; COMPUTER MISUSE; DECISION TREE; NETWORK SECURITY; SECURITY BREACH;

EID: 13844275774     PISSN: 08874417     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (9)

References (41)
  • 1
    • 1542731599 scopus 로고
    • Pamphlet prepared by the Task force on Computer Crime, American Bar Association, Section on Criminal Justice, 1800 M Street, Washington, DC 20036
    • American Bar Association. Report on Computer Crime. Pamphlet prepared by the Task force on Computer Crime, American Bar Association, Section on Criminal Justice, 1800 M Street, Washington, DC 20036, 1984.
    • (1984) Report on Computer Crime
  • 2
    • 0347892655 scopus 로고
    • Hack attack: Cyberthieves siphon millions from U.S. firms
    • Anthes, G. "Hack Attack: Cyberthieves Siphon Millions from U.S. Firms," Computerworld, 30:16, 1986, p. 81.
    • (1986) Computerworld , vol.30 , Issue.16 , pp. 81
    • Anthes, G.1
  • 3
    • 0027804413 scopus 로고
    • Information systems security design methods: Implications for information systems development
    • Baskerville, R. "Information Systems Security Design Methods: Implications for Information Systems Development," ACM Computing Surveys, 25:4, 1993, pp. 749-764.
    • (1993) ACM Computing Surveys , vol.25 , Issue.4 , pp. 749-764
    • Baskerville, R.1
  • 4
    • 84876659318 scopus 로고    scopus 로고
    • CERT Coordination Center. CERT/CC Overview: Trends, on-line. Available: http://www.cert.org/present/certoverview-trends/.
    • CERT/CC Overview: Trends
  • 7
    • 84876597713 scopus 로고    scopus 로고
    • New E-commerce study reveals key management issues
    • ISACA, Rolling Meadows, IL
    • Deloitte & Touché. "New E-commerce Study Reveals Key Management Issues," E-commerce Security: A Global Status Report, ISACA, Rolling Meadows, IL, 2000.
    • (2000) E-commerce Security: A Global Status Report
    • Deloitte1    Touché2
  • 11
    • 0347871399 scopus 로고    scopus 로고
    • Developing a computer security policy for organizational use and implementation
    • Forcht, K.A. and W.C. Ayers. "Developing a Computer Security Policy for Organizational Use and Implementation," Journal of Computer Information Systems, 41:2, 2001, pp. 52-57.
    • (2001) Journal of Computer Information Systems , vol.41 , Issue.2 , pp. 52-57
    • Forcht, K.A.1    Ayers, W.C.2
  • 13
    • 0002042413 scopus 로고
    • The 9 to 5 underground: Are you policing computer crime?
    • Summer
    • Hoffer, J.A. and D.W. Straub. "The 9 to 5 Underground: Are You Policing Computer Crime?" Sloan Management Review, 30:4, Summer 1989, pp. 35-44.
    • (1989) Sloan Management Review , vol.30 , Issue.4 , pp. 35-44
    • Hoffer, J.A.1    Straub, D.W.2
  • 14
    • 84860082375 scopus 로고
    • Chichester: Wiley
    • nd. Chichester: Wiley, 1987.
    • (1987) nd
    • Hogarth, R.M.1
  • 15
    • 84876642056 scopus 로고
    • Computer usage characteristics and small service firms: An exploratory study
    • Winter
    • Kahai, P., M Gibson, and K. Swinehart. "Computer Usage Characteristics and Small Service Firms: An Exploratory Study," Journal of Computer Information Systems, 33:2, Winter 1992-1993, pp. 70-76.
    • (1992) Journal of Computer Information Systems , vol.33 , Issue.2 , pp. 70-76
    • Kahai, P.1    Gibson, M.2    Swinehart, K.3
  • 16
    • 0023825657 scopus 로고
    • Computer backup pools, disaster recovery, and default risk
    • Kahane, Y., S. Neumann, and C. Tapiero. "Computer Backup Pools, Disaster Recovery, and Default Risk," Communications of the ACM, 31:1, 1988.
    • (1988) Communications of the ACM , vol.31 , Issue.1
    • Kahane, Y.1    Neumann, S.2    Tapiero, C.3
  • 17
    • 0346173289 scopus 로고    scopus 로고
    • Information security
    • Kulczycki, G. "Information Security," Management Accounting, LXXIX:6, 1997, pp. 18-24.
    • (1997) Management Accounting , vol.79 , Issue.6 , pp. 18-24
    • Kulczycki, G.1
  • 18
    • 0000133760 scopus 로고
    • Threats to information systems: Today's reality, yesterday's understanding
    • Loch, K.D., H.H. Carr, and M.E. Warkentin. "Threats to Information Systems: Today's Reality, Yesterday's Understanding," MIS Quarterly, 16:2, 1992, pp. 173-186.
    • (1992) MIS Quarterly , vol.16 , Issue.2 , pp. 173-186
    • Loch, K.D.1    Carr, H.H.2    Warkentin, M.E.3
  • 22
  • 29
    • 84876658271 scopus 로고
    • Computer viruses: Symptoms, remedies, and preventive measures
    • Sanford, C. "Computer Viruses: Symptoms, Remedies, and Preventive Measures," Journal of Computer Information Systems, 22:3, 1993, p. 67.
    • (1993) Journal of Computer Information Systems , vol.22 , Issue.3 , pp. 67
    • Sanford, C.1
  • 31
    • 1642568985 scopus 로고    scopus 로고
    • Hackers are ubiquitous, malicious and taken far too lightly, experts say
    • Schwartz, K. "Hackers are Ubiquitous, Malicious and Taken Far Too Lightly, Experts Say," Government Computer News, 16:23, 1997, pp. 81-82.
    • (1997) Government Computer News , vol.16 , Issue.23 , pp. 81-82
    • Schwartz, K.1
  • 33
    • 1642328743 scopus 로고    scopus 로고
    • How secure is your network?
    • Shipley, G. "How Secure is Your Network?" Network Computing," 2000, p. 58.
    • (2000) Network Computing , pp. 58
    • Shipley, G.1
  • 34
    • 0031524645 scopus 로고    scopus 로고
    • A task-based approach to implementing computer security
    • Steinke, G. "A Task-based Approach to Implementing Computer Security," Journal of Computer Information Systems, 38:1, 1998, pp. 47-54.
    • (1998) Journal of Computer Information Systems , vol.38 , Issue.1 , pp. 47-54
    • Steinke, G.1
  • 35
    • 85139144524 scopus 로고
    • Controlling computer abuse: An empirical study of effective security countermeasures
    • Pittsburgh, PA, December 6-8
    • Straub, D. "Controlling Computer Abuse: An Empirical Study of Effective Security Countermeasures," Proceedings of the International Conference on Information Systems, Pittsburgh, PA, December 6-8, 1987, pp. 277-289.
    • (1987) Proceedings of the International Conference on Information Systems , pp. 277-289
    • Straub, D.1
  • 37
    • 0000280419 scopus 로고
    • Effective IS security: An empirical study
    • Straub, D. "Effective IS Security: An Empirical Study," Information Systems Research, 1:3, 1990, pp. 255-276.
    • (1990) Information Systems Research , vol.1 , Issue.3 , pp. 255-276
    • Straub, D.1
  • 38
    • 0001133137 scopus 로고    scopus 로고
    • Coping with systems risk: Security planning models for management decision-making
    • Straub, D.W. and R.J. Welke. "Coping with Systems Risk: Security Planning Models for Management Decision-making," MIS Quarterly, 22:4, 1998, pp. 441-469.
    • (1998) MIS Quarterly , vol.22 , Issue.4 , pp. 441-469
    • Straub, D.W.1    Welke, R.J.2
  • 39
    • 13844285800 scopus 로고    scopus 로고
    • Calculating risk
    • March
    • Tippett, P. "Calculating Risk," Information Security, 3, March 2001, pp. 36-38.
    • (2001) Information Security , vol.3 , pp. 36-38
    • Tippett, P.1
  • 41
    • 4243198165 scopus 로고    scopus 로고
    • Enemy at the gate: Threats to information security
    • Whitman, M. "Enemy at the Gate: Threats to Information Security," Communications of the ACM, 46:8, 2003, pp. 91-95.
    • (2003) Communications of the ACM , vol.46 , Issue.8 , pp. 91-95
    • Whitman, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.