基本信息来源于合作网站,原文需代理用户跳转至来源网站获取       
摘要:
Studied in this article is whether the Bayesian Network Model (BNM) can be effectively applied to the prioritization of defense in-depth security tools and procedures and to the combining of those measures to reduce cyber threats. The methods used in this study consisted of scanning 24 peer reviewed Cybersecurity Articles from prominent Cybersecurity Journals using the Likert Scale Model for the article’s list of defense in depth measures (tools and procedures) and the threats that those measures were designed to reduce. The defense in depth tools and procedures are then compared to see whether the Likert scale and the Bayesian Network Model could be effectively applied to prioritize and combine the measures to reduce cyber threats attacks against organizational and private computing systems. The findings of the research reject the H0 null hypothesis that BNM does not affect the relationship between the prioritization and combining of 24 Cybersecurity Article’s defense in depth tools and procedures (independent variables) and cyber threats (dependent variables).
推荐文章
基于WS-security的数据安全交换
端到端
WS-Security
SOAP消息
令牌
基于SOAP协议的Web Service 安全基础规范(WS-Security)
Web Service
WS-Security
安全规范
安全信息交换
SOAP协议扩展
The in situ spectral methods for examining redox status of c-type cytochromes in metal-reducing/oxid
c-type cytochrome
In situ spectroscopy
Intact cells
Metal reducing bacteria
Fe(Ⅱ) oxidation bacteria
Spatial analysis of carbon storage density of mid-subtropical forests using geostatistics: a case st
Carbon storage density
Geostatistics
Mid-subtropical forests
Spatial autocorrelation
Spatial heterogeneity
内容分析
关键词云
关键词热度
相关文献总数  
(/次)
(/年)
文献信息
篇名 Reducing Threats by Using Bayesian Networks to Prioritize and Combine Defense in Depth Security Measures
来源期刊 信息安全(英文) 学科 工学
关键词 Information Assurance Bayesian Networks Influence Diagrams Defense in Depth Information Technology Network Security CYBERSECURITY
年,卷(期) 2020,(3) 所属期刊栏目
研究方向 页码范围 121-137
页数 17页 分类号 TP3
字数 语种
DOI
五维指标
传播情况
(/次)
(/年)
引文网络
引文网络
二级参考文献  (0)
共引文献  (0)
参考文献  (0)
节点文献
引证文献  (0)
同被引文献  (0)
二级引证文献  (0)
2020(0)
  • 参考文献(0)
  • 二级参考文献(0)
  • 引证文献(0)
  • 二级引证文献(0)
研究主题发展历程
节点文献
Information
Assurance
Bayesian
Networks
Influence
Diagrams
Defense
in
Depth
Information
Technology
Network
Security
CYBERSECURITY
研究起点
研究来源
研究分支
研究去脉
引文网络交叉学科
相关学者/机构
期刊影响力
信息安全(英文)
季刊
2153-1234
武汉市江夏区汤逊湖北路38号光谷总部空间
出版文献量(篇)
230
总下载数(次)
0
总被引数(次)
0
论文1v1指导