2019
DOI: 10.30958/ajte.6-4-2
|View full text |Cite
|
Sign up to set email alerts
|

Using an Extended Attack Defense Graph Model to Estimate the Risk of a Successful Attack on an IT Infrastructure

Abstract: Nowadays, securing the IT infrastructure is an ongoing task in every company and organization. For small and medium-sized enterprises, this task is challenging because of its complexity and the related costs. Especially the risk assessment of threats and the choice of appropriate countermeasures is hard to handle by this kind of enterprises. Using the example of a ransomware attack, this paper describes how to use a method for risk assessment on the basis of attack defence graphs and Monte Carlo simulations. T… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 6 publications
(5 reference statements)
0
3
0
Order By: Relevance
“…The cybersecurity for critical infrastructures is analyzed in [ 31 , 32 ] or [ 33 ]. These papers primarily focused on the negative consequences of cybersecurity threats to the whole system and its operational costs.…”
Section: Cyber Risk In the Mining Industry—related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The cybersecurity for critical infrastructures is analyzed in [ 31 , 32 ] or [ 33 ]. These papers primarily focused on the negative consequences of cybersecurity threats to the whole system and its operational costs.…”
Section: Cyber Risk In the Mining Industry—related Workmentioning
confidence: 99%
“…In [ 32 ], the authors compared the unit commitments models to tackle renewable uncertainty in power systems. The authors of [ 33 ] focused on information technology (IT) infrastructure and its resilience to cyber threats. Later, the authors in [ 34 ] defined three main areas characteristic for cybersecurity studies: Technology, i.e., development of technological solutions that are aimed at reducing or identifying threats and attacks; Investments in cybersecurity; Risk assessment models focused on measuring the risk of cyberattack occurrence.…”
Section: Cyber Risk In the Mining Industry—related Workmentioning
confidence: 99%
“…This is basically a roulette wheel selection as used in genetic optimization; see for example (Lipowski and Lipowska 2012) or (Goldberg 1989). More details on the final implementation can be found in (Karg and Hänisch 2019).…”
Section: Table 1 Definition Of Probability Scale Values the Same Vamentioning
confidence: 99%