Show simple item record

dc.contributor.advisorRay, Indrajit
dc.contributor.advisorRay, Indrakshi, 1966-
dc.contributor.authorPoolsappasit, Nayot
dc.contributor.committeememberMcConnell, Ross M.
dc.contributor.committeememberJayasumana, Anura P.
dc.date.accessioned2007-01-03T04:41:49Z
dc.date.available2007-01-03T04:41:49Z
dc.date.issued2010
dc.description2010 Summer.
dc.descriptionIncludes bibliographical references.
dc.description.abstractRisk management is a process that allows IT managers to balance between cost of the protective measures and gains in mission capability. A system administrator has to make a decision and choose an appropriate security plan that maximizes the resource utilization. However, making the decision is not a trivial task. Most organizations have tight budgets for IT security; therefore, the chosen plan must be reviewed as thoroughly as other management decisions. Unfortunately, even the best-practice security risk management frameworks do not provide adequate information for effective risk management. Vulnerability scanning and penetration testing that form the core of traditional risk management, identify only the set of system vulnerabilities. Given the complexity of today's network infrastructure, it is not enough to consider the presence or absence of vulnerabilities in isolation. Materializing a threat strongly requires the combination of multiple attacks using different vulnerabilities. Such a requirement is far beyond the capabilities of current day vulnerability scanners. Consequently, assessing the cost of an attack or cost of implementing appropriate security controls is possible only in a piecemeal manner. In this work, we develop and formalize new network vulnerability analysis model. The model encodes in a concise manner, the contributions of different security conditions that lead to system compromise. We extend the model with a systematic risk assessment methodology to support reasoning under uncertainty in an attempt to evaluate the vulnerability exploitation probability. We develop a cost model to quantify the potential loss and gain that can occur in a system if certain conditions are met (or protected). We also quantify the security control cost incurred to implement a set of security hardening measures. We propose solutions for the system administrator's decision problems covering the area of the risk analysis and risk mitigation analysis. Finally, we extend the vulnerability assessment model to the areas of intrusion detection and forensic investigation.
dc.format.mediumborn digital
dc.format.mediumdoctoral dissertations
dc.identifierPoolsappasit_colostate_0053A_10071.pdf
dc.identifierETDF2010100009COMS
dc.identifier.urihttp://hdl.handle.net/10217/40477
dc.languageEnglish
dc.publisherColorado State University. Libraries
dc.relation.ispartof2000-2019 - CSU Theses and Dissertations
dc.rightsCopyright of the original work is retained by the author.
dc.subjectdata security
dc.subjectsecurity best practice
dc.subjectsecurity
dc.subjectrisk management
dc.subjectmulti-objective optimization
dc.subject.lcshComputer security -- Management
dc.subject.lcshCyberterrorism
dc.subject.lcshInformation technology -- Risk management
dc.subject.lcshComputer networks -- Security measures
dc.titleTowards an efficient vulnerability analysis methodology for better security risk management
dc.typeText
dcterms.rights.dplaThe copyright and related rights status of this item has not been evaluated (https://rightsstatements.org/vocab/CNE/1.0/). Please refer to the organization that has made the Item available for more information.
thesis.degree.disciplineComputer Science
thesis.degree.grantorColorado State University
thesis.degree.levelDoctoral
thesis.degree.nameDoctor of Philosophy (Ph.D.)


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record