咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >Reducing Threats by Using Baye... 收藏

Reducing Threats by Using Bayesian Networks to Prioritize and Combine Defense in Depth Security Measures

Reducing Threats by Using Bayesian Networks to Prioritize and Combine Defense in Depth Security Measures

作     者:Rodney Alexander Rodney Alexander

作者机构:Hutchinson Community College Hutchinson Kansas USA 

出 版 物:《Journal of Information Security》 (信息安全(英文))

年 卷 期:2020年第11卷第3期

页      面:121-137页

学科分类:08[工学] 0812[工学-计算机科学与技术(可授工学、理学学位)] 

主  题:Information Assurance Bayesian Networks Influence Diagrams Defense in Depth Information Technology Network Security Cybersecurity 

摘      要:Studied in this article is whether the Bayesian Network Model (BNM) can be effectively applied to the prioritization of defense in-depth security tools and procedures and to the combining of those measures to reduce cyber threats. The methods used in this study consisted of scanning 24 peer reviewed Cybersecurity Articles from prominent Cybersecurity Journals using the Likert Scale Model for the article’s list of defense in depth measures (tools and procedures) and the threats that those measures were designed to reduce. The defense in depth tools and procedures are then compared to see whether the Likert scale and the Bayesian Network Model could be effectively applied to prioritize and combine the measures to reduce cyber threats attacks against organizational and private computing systems. The findings of the research reject the H0 null hypothesis that BNM does not affect the relationship between the prioritization and combining of 24 Cybersecurity Article’s defense in depth tools and procedures (independent variables) and cyber threats (dependent variables).

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分