Abstract

The article presents the concept of building a network security model and its application in the process of risk analysis. It indicates the possibility of a new definition of the role of the network models in the safety analysis. Special attention was paid to the development of the use of an algorithm describing the process of identifying the assets, vulnerability and threats in a given context. The aim of the article is to present how this algorithm reduced the complexity of the problem by eliminating from the base model these components that have no links with others component and as a result and it was possible to build a real network model corresponding to reality.

Highlights

  • The article presents the concept of building a network security model and its application in the process of risk analysis

  • Methods based on Bayesian statistics and Bayesian networks are classified as non-applicable to risk identification of qualitative, quantitative or semiquantitative estimation of the probability at the stage of risk analysis or risk assessment at the stage of risk analysis

  • It becomes apparent that the use of the Bayesian networks can be limited not to the full network configuration, but to its subgraph so as to include the selected hazards in the analysis

Read more

Summary

Networks - basic definitions and advantages of the network models

Network is the collection of all ordered triples:. where:. Is a set of functions defined on set X of vertices of graph G ĭi : X ĺ R, i = 1...I and { Ȍj} = { Ȍ1, ..., ȌJ} (4). If the links described by the edges are clearly defined - which is relatively easy in the network - the introduction of priors for performing the Bayesian analysis on such network is feasible and bears the characteristics of objectivity, not of a subjective expertise. The most important thing is that the network models are typical tools for analysing the situation, in which there is no valid characterization of probability based on tests with a given repetition. Developing methods for building the network security models may prove to be a truly cost-effective method of analysis of potential security despite the above-mentioned limitations

Model office - example of analysis
Overview of the methodology
The use of the network model in the context under consideration
Summary
PKN–ISO GUIDE 73 Risk management Terminology
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call