Risk propagation assessment for network security : application to airport communication network design /
The focus of this book is risk assessment methodologies for network architecture design. The main goal is to present and illustrate an innovative risk propagation-based quantitative assessment tool. This original approach aims to help network designers and security administrators to design and build...
Κύριος συγγραφέας: | |
---|---|
Άλλοι συγγραφείς: | , |
Μορφή: | Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
London :
ISTE ;
2013.
London : Wiley, 2013. |
Σειρά: | Focus series in networks and telecommunications.
|
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
LEADER | 06391nam a2200757 4500 | ||
---|---|---|---|
001 | ocn842919752 | ||
003 | OCoLC | ||
005 | 20170124070206.8 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 130514s2013 enka ob 001 0 eng d | ||
040 | |a N$T |b eng |e pn |c N$T |d DG1 |d YDXCP |d OCLCO |d IDEBK |d CUS |d MEAUC |d OCLCQ |d COO |d OCLCQ |d GrThAP | ||
019 | |a 840466741 |a 857933890 | ||
020 | |a 9781118579947 |q (electronic bk.) | ||
020 | |a 1118579941 |q (electronic bk.) | ||
020 | |a 9781118578735 |q (electronic bk.) | ||
020 | |a 1118578732 |q (electronic bk.) | ||
020 | |a 1118581016 |q (electronic bk.) | ||
020 | |a 9781118581018 |q (electronic bk.) | ||
020 | |z 9781848214545 | ||
020 | |z 1848214545 | ||
029 | 1 | |a AU@ |b 000051628928 | |
029 | 1 | |a CHBIS |b 010026902 | |
029 | 1 | |a CHVBK |b 306237598 | |
029 | 1 | |a DEBBG |b BV041906759 | |
029 | 1 | |a DKDLA |b 820120-katalog:000652262 | |
029 | 1 | |a NZ1 |b 15341692 | |
029 | 1 | |a DEBBG |b BV043395826 | |
035 | |a (OCoLC)842919752 |z (OCoLC)840466741 |z (OCoLC)857933890 | ||
050 | 4 | |a TK5105.59 |b .B452 2013eb | |
072 | 7 | |a TRA |x 002040 |2 bisacsh | |
082 | 0 | 4 | |a 387.740426 |2 23 |
049 | |a MAIN | ||
100 | 1 | |a Ben Mahmoud, Mohamed Slim. | |
245 | 1 | 0 | |a Risk propagation assessment for network security : |b application to airport communication network design / |c Mohamed Slim Ben Mahmoud, Nicolas Larrieu, Alain Pirovano. |
264 | 1 | |a London : |b ISTE ; |c 2013. | |
264 | 1 | |a London : |b Wiley, |c 2013. | |
300 | |a 1 online resource (xviii, 119 pages) : |b illustrations. | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a Focus series in networks and telecommunications | |
504 | |a Includes bibliographical references (pages 111-115) and index. | ||
588 | 0 | |a Print version record. | |
505 | 0 | |a Title Page; Contents; LIST OF FIGURES; LIST OF TABLES; INTRODUCTION; PART 1. NETWORK SECURITY RISK ASSESSMENT; CHAPTER 1. INTRODUCTION TO INFORMATION SYSTEMSECURITY RISK MANAGEMENT PROCESS; 1.1. On the importance of network security for network designers; 1.2. On the impact of risk assessment in the decision-making process for network security designers; 1.3. Quantitative versus qualitative risk assessment approaches; 1.4. Network security risk propagation concept; 1.4.1. Impact of node correlation; 1.4.2. Network security risk transitivity. | |
505 | 8 | |a 1.4.3. Network security risk propagation illustrative caseCHAPTER 2. SECURITY RISK MANAGEMENTBACKGROUND; 2.1. Qualitative security risk management methods; 2.1.1. CRAMM; 2.1.2. OCTAVE; 2.1.3. EBIOS; 2.1.4. MEHARI; 2.1.5. CORAS; 2.1.6. Discussion; 2.2. Quantitative security risk assessment approaches; 2.3. Toward a quantitative propagation-based risk assessment methodology; CHAPTER 3. A QUANTITATIVE NETWORK RISK ASSESSMENT METHODOLOGY BASED ON RISK PROPAGATION; 3.1. Quantifying methodology parameters; 3.1.1. Network risk decomposition; 3.1.2. Node value; 3.1.3. Enhanced node value. | |
505 | 8 | |a 3.1.4. Impact of threats3.1.5. Likelihood of threats; 3.2. Network security risk assessment process; 3.3. Conclusion; PART 2. APPLICATION TO AIRPORT COMMUNICATION NETWORK DESIGN; CHAPTER 4. THE AEROMACS COMMUNICATION SYSTEM IN THE SESAR PROJECT; 4.1. Overview of the European SESAR project; 4.2. Overview of aeronautical communications operating concept and requirements; 4.3. Introduction to the AeroMACS communication system; 4.3.1. AeroMACS protocol stack; 4.3.2. AeroMACS reference network architecture; 4.3.3. AeroMACS security considerations; 4.3.3.1. Analysis of AeroMACS securityweaknesses. | |
505 | 8 | |a 4.3.4. AeroMACS reference network topology4.3.4.1. Isolated AeroMACS network architecture; 4.3.4.2. End-to-end AeroMACS network architecture; CHAPTER 5. AERONAUTICAL NETWORK CASE STUDY; 5.1. Experimental parameters; 5.1.1. Testbed infrastructure; 5.1.2. Aeronautical node values instantiation; 5.1.3. Aeronautical services instantiation; 5.1.4. Isolated vs. end-to-end emulation scenarios; 5.2. AeroMACS case study: experimental results; 5.2.1. Main inputs for emulation scenarios; 5.2.2. Isolated AeroMACS scenario: preliminary results; 5.2.2.1. Individual risks; 5.2.2.2. Propagated risks. | |
505 | 8 | |a 5.2.2.3. Node and network risks5.2.3. Isolated AeroMACS scenario: EAP vs. RSA sub-scenario; 5.2.4. Preliminary AeroMACS security enhancement guidance; 5.2.5. AeroMACS implementation improvements: isolated scenario without operational server vulnerabilities; 5.2.5.1. Experimental inputs; 5.2.5.2. Network topology; 5.2.5.3. Vulnerability statistics; 5.2.5.4. Individual risk results; 5.2.5.5. Propagated risk results; 5.2.5.6. Network risk results; 5.2.6. AeroMACS topological improvements: isolated scenario with two ASN gateways; 5.2.6.1. Experimental inputs; 5.2.6.2. Network topology. | |
520 | |a The focus of this book is risk assessment methodologies for network architecture design. The main goal is to present and illustrate an innovative risk propagation-based quantitative assessment tool. This original approach aims to help network designers and security administrators to design and build more robust and secure network topologies. As an implementation case study, the authors consider an aeronautical network based on AeroMACS (Aeronautical Mobile Airport Communications System) technology. AeroMACS has been identified as the wireless access network for airport surface communication. | ||
650 | 0 | |a Computer networks |x Security measures |x Design. | |
650 | 0 | |a Aeronautics |x Communication systems |x Design and construction. | |
650 | 0 | |a Computer network architectures. | |
650 | 0 | |a Risk assessment. | |
650 | 4 | |a Aeronautics |x Communication systems |x Design and construction. | |
650 | 4 | |a Aeronautics |x Communication systems. | |
650 | 4 | |a Computer network architectures. | |
650 | 4 | |a Computer networks |x Security measures |x Design. | |
650 | 7 | |a TRANSPORTATION |x Aviation |x Commercial. |2 bisacsh | |
655 | 4 | |a Electronic books. | |
700 | 1 | |a Larrieu, Nicolas. | |
700 | 1 | |a Pirovano, Alain. | |
776 | 0 | 8 | |i Print version: |a Ben Mahmoud, Mohamed Slim. |t Risk propagation assessment for network security. |d London : ISTE ; London : Wiley, 2013 |z 9781848214545 |w (OCoLC)820781974 |
830 | 0 | |a Focus series in networks and telecommunications. | |
856 | 4 | 0 | |u https://doi.org/10.1002/9781118579947 |z Full Text via HEAL-Link |
994 | |a 92 |b DG1 |