Affiliation:
1. Embry-Riddle Aeronautical University, USA
2. Athens State University, USA
Abstract
A flow-graph depicts the interrelationships among cyber security and security threats/incidents (i.e., internal, external, and accidental). Using a flow-graph, the manner in which security threats may affect systems can be investigated. This paper reports analytical approaches to analyze time to security threats and probability of security threat occurrence. Considering embedded threat detection functions in a safe-guard unit, the proposed approaches use the flow-graph concept, and Markovian method to calculate time to security threat occurrence and its probability. The threat detection functions are featured by incident detection and recovery mechanisms. The results of this study can be used by all parties (public and private sector organizations, service providers, IT, and insurance companies) to better deal with cyber security issues with respect to utilizing technology, investment, and insurance. An illustrative example is demonstrated to present the application of the approach.
Reference49 articles.
1. Data-driven cyber-vulnerability maintenance policies.;A.Afful-Dadzie;Journal of Quality Technology,2014
2. Pre-service teachers' perceptions of information assurance and cyber security.;J.Agamba;International Journal of Information and Communication Technology Education,2012
3. A detailed strategy for managing corporation cyber war security.;W.Al-Ahmad;International Journal of Cyber-Security and Digital Forensics,2013
4. Detection and Protection Against Intrusions on Smart Grid Systems
5. A Comparative Legal Analysis of Online Defamation in Malaysia, Singapore and the United Kingdom
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献