Detail publikačního výsledku

Threat analysis based on the graph of elementary threats.

BURDA, K.

Originální název

Threat analysis based on the graph of elementary threats.

Anglický název

Threat analysis based on the graph of elementary threats.

Druh

Článek recenzovaný mimo WoS a Scopus

Originální abstrakt

At present, an analysis based on the threat tree is used for analysis of threats to information systems. Orientation to a single threat is a characteristic feature of this method. If the analysis is more extensive, then a threat tree is created for each single threat. This solution causes a complicated influence analysis of the partial threats that occur in several trees. In this paper, a method for threat analysis is described which enables a complex influence analysis of partial threats and a choice of optimal set of security countermeasures.

Anglický abstrakt

At present, an analysis based on the threat tree is used for analysis of threats to information systems. Orientation to a single threat is a characteristic feature of this method. If the analysis is more extensive, then a threat tree is created for each single threat. This solution causes a complicated influence analysis of the partial threats that occur in several trees. In this paper, a method for threat analysis is described which enables a complex influence analysis of partial threats and a choice of optimal set of security countermeasures.

Klíčová slova

threat analysis, elementary threat

Klíčová slova v angličtině

threat analysis, elementary threat

Autoři

BURDA, K.

Rok RIV

2010

Vydáno

30.12.2008

Nakladatel

IJCSNS

Místo

Seoul, Korea

ISSN

1738-7906

Periodikum

International Journal of Computer Science and Network Security

Svazek

8

Číslo

12

Stát

Korejská republika

Strany od

66

Strany do

68

Strany počet

3

Plný text v Digitální knihovně

BibTex

@article{BUT47602,
  author="Karel {Burda}",
  title="Threat analysis based on the graph of elementary threats.",
  journal="International Journal of Computer Science and Network Security",
  year="2008",
  volume="8",
  number="12",
  pages="66--68",
  issn="1738-7906"
}