We first consider network security services and then review threats, vulnerabilities and failure modes. This review is based on standard texts, using well-known concepts, categorizations, and methods, e.g. risk analysis using asset-based threat profiles and vulnerability profiles (attributes). The review is used to construct a framework which is then used to define an extensible ontology for network security attacks. We present a conceptualization of this ontology in figure 1. Keywords: network, cyber, security, ontology, attack, threat, vulnerability, failure.
CITATION STYLE
Simmonds, A., Sandilands, P., & Ekert, L. V. (2004). Applied Computing. Network Security (Vol. 3285, pp. 317–323). Retrieved from http://www.springerlink.com/index/1LQ24LD9UDHX9G8Q.pdf
Mendeley helps you to discover research relevant for your work.