Abstract

ABSTRACTThis paper presents a new concept for information security assessments while promoting several areas of its application. Threat generation, attack pattern analysis, quantitative risk computation, and network security monitoring locally or remotely are the major application areas of this concept. Instead of testing assets one by one, by applying separate repetitive attacks and assessments, the presented system generates and executes attacks once on a sample group, composes assessment data, and uses the data for the assessment of an entire network. This unique approach can be used as a model to guide the development of tool‐based assessment systems, intelligent network security analysis, monitoring systems, and also as a complementary function in information security test and evaluation laboratories. Copyright © 2012 John Wiley & Sons, Ltd.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.