Using Time Patterns to Verify the Utilization of Stochastic Calculus in Security Quantification
With no doubt, keeping a certain level of security for an Information System (IS) is an intriguing as well as a wearisome challenge. It involves not only skillful technicians but also a master plan that will eventually consume a lot of companys resources. Thus, the prime and most difficult concern of any manager is how to deploy his resources so as not to undermine the day-to-day work of the company and, at the same time, achieve the maximum downsizing of risk exposure. The primary objective of this paper is to study the time patterns which characterize the behavior of the technical risk factors that affect an Information System. The output of this research is intended to be used as an input for the model the authors proposed in |2|. The data sources used for our research remain focused on open source vulnerability databases, so as to conserve unbiasedness for the outcomes. At the end, we will be able to provide an unbiased, reliable and quantified risk assessment methodology for the security level of Information Systems.
component time patterns security quantification software vulnerabilities
Nikolaos Alexandris Evangelos Fountas Dimitrios Mermigas Sotirios Pirounias
Department of Informatics, University of Piraeus 80 Karaoli & Dimitrioustr 18534 Piraeus, Greece
国际会议
成都
英文
1096-1100
2010-12-17(万方平台首次上网日期,不代表论文的发表时间)