메뉴 건너뛰기




Volumn 4347 LNCS, Issue , 2006, Pages 42-54

Assessing the risk of an information infrastructure through security dependencies

Author keywords

Countermeasure; Mitigation plan; Ranking; Risk assessment; Vulnerability

Indexed keywords

ABSTRACTION LEVEL; ATTACK STRATEGIES; COUNTERMEASURE; INFORMATION INFRASTRUCTURES; MITIGATION PLANS; RANKING; SECURITY ATTRIBUTES; VULNERABILITY;

EID: 80053192249     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11962977_4     Document Type: Conference Paper
Times cited : (11)

References (21)
  • 5
    • 0001094070 scopus 로고
    • The use of the CCTA risk analysis and management methodology CRAMM
    • B. Barber, J. Davey, The use of the CCTA risk analysis and management methodology CRAMM. Proc. MEDINFO92, North Holland, 1589 pp.1593, 1992.
    • (1992) Proc. MEDINFO92, North Holland , vol.1589 , pp. 1593
    • Barber, B.1    Davey, J.2
  • 9
    • 34047168454 scopus 로고    scopus 로고
    • An annotated review of past paper on attack graphs
    • Lincoln Lab. MIT, March
    • R.P. Lipmann, K.W. Ingols, An Annotated Review of Past Paper on Attack Graphs, Project Report, Lincoln Lab. MIT, March 2005.
    • (2005) Project Report
    • Lipmann, R.P.1    Ingols, K.W.2
  • 13
    • 67349118743 scopus 로고    scopus 로고
    • The common vulnerability scoring system
    • National Infrastructure Advisory Council, Oct
    • National Infrastructure Advisory Council, The Common Vulnerability Scoring System, Final Report and Recomandations, Oct. 2004
    • (2004) Final Report and Recomandations
  • 14
    • 0038011185 scopus 로고    scopus 로고
    • Constructing attack scenarios through correlation of intrusion alerts
    • Nov, Washington, DC, USA
    • P. Ning, et al., Constructing attack scenarios through correlation of intrusion alerts, 9th ACM Conf. on Computer and Communications Security, Nov. 2002, Washington, DC, USA.
    • (2002) 9th ACM Conf. on Computer and Communications Security
    • Ning, P.1
  • 16
    • 84948965481 scopus 로고    scopus 로고
    • Representing TCP/IP connectivity for topological analysis of network security
    • Dec
    • R. Ritchey, et al., Representing TCP/IP Connectivity For Topological Analysis of Network Security, 18th Annual Computer Security Applications Conf, p.25, Dec. 2002.
    • (2002) 18th Annual Computer Security Applications Conf , pp. 25
    • Ritchey, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.