Proceedings of the 6th International Conference on Communications and Broadband Networking 2018
DOI: 10.1145/3193092.3193096
|View full text |Cite
|
Sign up to set email alerts
|

A Threat-Driven Approach to Modeling a Campus Network Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 4 publications
0
3
0
Order By: Relevance
“…Borges (2021) lists malware (viruses, rogue software, trojans, spyware, worms), DoS attacks, phishing, rootkits, SQL injections and MitM attacks as the most prevalent threats to a system. Naagas and Palaoag (2018) compiled a comprehensive list of threats to an information system that can be applied here. Whitman (2004) also provides a list of threats and additionally names protection mechanisms that were employed -of which 100% of survey respondents used passwords.…”
Section: Literature Reviewmentioning
confidence: 99%
See 2 more Smart Citations
“…Borges (2021) lists malware (viruses, rogue software, trojans, spyware, worms), DoS attacks, phishing, rootkits, SQL injections and MitM attacks as the most prevalent threats to a system. Naagas and Palaoag (2018) compiled a comprehensive list of threats to an information system that can be applied here. Whitman (2004) also provides a list of threats and additionally names protection mechanisms that were employed -of which 100% of survey respondents used passwords.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Christelle Steyn and Dewald Blaauw Naagas and Palaoag (2018) provide the following equation to calculate DREAD risk scores: rst=(D+R+E+A+D)/5. A risk level of 7-10 is considered high, while 4-6 is medium and 1-3 is low.…”
Section: Figure 10: Poach Animal Attack Treementioning
confidence: 99%
See 1 more Smart Citation
“…A model used to describe the impact of threats is the DREAD (Damage Potential, Reproducibility, Exploitability, Affected Users, Discoverability) model. DREAD is a mnemonic for risk rating using five categories (Naagas & Palaoag, 2018). This modeling technique assesses the likelihood of an attack is and the damage it would cause.…”
Section: Review Of Literaturementioning
confidence: 99%