dc.contributor.author |
Stango, A |
en |
dc.contributor.author |
Prasad, NR |
en |
dc.contributor.author |
Kyriazanos, DM |
en |
dc.date.accessioned |
2014-03-01T02:45:56Z |
|
dc.date.available |
2014-03-01T02:45:56Z |
|
dc.date.issued |
2009 |
en |
dc.identifier.uri |
https://dspace.lib.ntua.gr/xmlui/handle/123456789/32465 |
|
dc.subject |
Assets |
en |
dc.subject |
Security metrics |
en |
dc.subject |
Threat analysis |
en |
dc.subject |
Vulnerabilities |
en |
dc.subject.other |
Assets |
en |
dc.subject.other |
Personal networks |
en |
dc.subject.other |
Risk mitigation |
en |
dc.subject.other |
Security enhancements |
en |
dc.subject.other |
Security evaluation |
en |
dc.subject.other |
Security metrics |
en |
dc.subject.other |
Threat analysis |
en |
dc.subject.other |
Threats and vulnerabilities |
en |
dc.subject.other |
Vulnerabilities |
en |
dc.subject.other |
Internet |
en |
dc.subject.other |
Metric system |
en |
dc.subject.other |
Network security |
en |
dc.title |
A threat analysis methodology for security evaluation and enhancement planning |
en |
heal.type |
conferenceItem |
en |
heal.identifier.primary |
10.1109/SECURWARE.2009.47 |
en |
heal.identifier.secondary |
http://dx.doi.org/10.1109/SECURWARE.2009.47 |
en |
heal.identifier.secondary |
5210987 |
en |
heal.publicationDate |
2009 |
en |
heal.abstract |
Threat analysis gives how potential adversaries exploit system weakness to achieve their goals. It identifies threats and defines a risk mitigation policy for a specific architecture, functionality and configuration. In a threat analysis security metrics are a challenging requirement in order to determine the status of network security performance and to further enhance it by minimizing exposure to considerable threats and vulnerabilities. In this paper the authors propose a generic methodology for threat analysis and security metrics in order to prioritize threats and vulnerabilities and proceed with security enhancement planning in Personal Networks (PNs). © 2009 IEEE. |
en |
heal.journalName |
Proceedings - 2009 3rd International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009 |
en |
dc.identifier.doi |
10.1109/SECURWARE.2009.47 |
en |
dc.identifier.spage |
262 |
en |
dc.identifier.epage |
267 |
en |