語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Software security economics and Thre...
~
Chen, Yue.
FindBook
Google Book
Amazon
博客來
Software security economics and Threat Modeling Based on Attack Path Analysis; a stakeholder value driven approach.
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Software security economics and Threat Modeling Based on Attack Path Analysis; a stakeholder value driven approach./
作者:
Chen, Yue.
面頁冊數:
141 p.
附註:
Adviser: Barry W. Boehm.
Contained By:
Dissertation Abstracts International69-01B.
標題:
Computer Science. -
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3291915
ISBN:
9780549391838
Software security economics and Threat Modeling Based on Attack Path Analysis; a stakeholder value driven approach.
Chen, Yue.
Software security economics and Threat Modeling Based on Attack Path Analysis; a stakeholder value driven approach.
- 141 p.
Adviser: Barry W. Boehm.
Thesis (Ph.D.)--University of Southern California, 2007.
The thesis presents the T&barbelow;hreat M&barbelow;odeling Method Based on A&barbelow;ttack P&barbelow;ath Analysis (T-MAP) which quantifies security threats by calculating the total severity weights of relevant attacking paths for Commercial Off The Shelf (COTS) based systems. Further security economic analysis enabled by T-MAP is demonstrated. Compared to existing approaches, T-MAP is sensitive to system stakeholder value priorities and organizational IT environment. It distills the technical details of thousands of relevant software vulnerabilities into management-friendly numbers at a high-level; it systematically establishes the traceability and consistency from management-level organizational value propositions to technical-level security threats and corresponding mitigation strategies. In its trial usage in a large IT organization, T-MAP demonstrated promising strength in prioritizing and estimating security investment cost-effectiveness, as well as in evaluating the security performance of COTS systems. The steps of using T-MAP to optimize the cost-effectiveness of software patching, user account control and firewall are demonstrated through case studies. A system stakeholder value sensitive Firewall rule generation method based on T-MAP is introduced. In addition, a software tool that automates T-MAP has been developed.
ISBN: 9780549391838Subjects--Topical Terms:
626642
Computer Science.
Software security economics and Threat Modeling Based on Attack Path Analysis; a stakeholder value driven approach.
LDR
:02426nam 2200313 a 45
001
941164
005
20110518
008
110518s2007 ||||||||||||||||| ||eng d
020
$a
9780549391838
035
$a
(UMI)AAI3291915
035
$a
AAI3291915
040
$a
UMI
$c
UMI
100
1
$a
Chen, Yue.
$3
1265297
245
1 0
$a
Software security economics and Threat Modeling Based on Attack Path Analysis; a stakeholder value driven approach.
300
$a
141 p.
500
$a
Adviser: Barry W. Boehm.
500
$a
Source: Dissertation Abstracts International, Volume: 69-01, Section: B, page: 0408.
502
$a
Thesis (Ph.D.)--University of Southern California, 2007.
520
$a
The thesis presents the T&barbelow;hreat M&barbelow;odeling Method Based on A&barbelow;ttack P&barbelow;ath Analysis (T-MAP) which quantifies security threats by calculating the total severity weights of relevant attacking paths for Commercial Off The Shelf (COTS) based systems. Further security economic analysis enabled by T-MAP is demonstrated. Compared to existing approaches, T-MAP is sensitive to system stakeholder value priorities and organizational IT environment. It distills the technical details of thousands of relevant software vulnerabilities into management-friendly numbers at a high-level; it systematically establishes the traceability and consistency from management-level organizational value propositions to technical-level security threats and corresponding mitigation strategies. In its trial usage in a large IT organization, T-MAP demonstrated promising strength in prioritizing and estimating security investment cost-effectiveness, as well as in evaluating the security performance of COTS systems. The steps of using T-MAP to optimize the cost-effectiveness of software patching, user account control and firewall are demonstrated through case studies. A system stakeholder value sensitive Firewall rule generation method based on T-MAP is introduced. In addition, a software tool that automates T-MAP has been developed.
590
$a
School code: 0208.
650
4
$a
Computer Science.
$3
626642
650
4
$a
Economics, Commerce-Business.
$3
626649
690
$a
0505
690
$a
0984
710
2
$a
University of Southern California.
$b
Computer Science: Doctor of Philosophy.
$3
1026068
773
0
$t
Dissertation Abstracts International
$g
69-01B.
790
$a
0208
790
1 0
$a
Boehm, Barry W.,
$e
advisor
790
1 0
$a
Huang, Mingdeh
$e
committee member
790
1 0
$a
Neuman, Clifford
$e
committee member
790
1 0
$a
Steece, Bert
$e
committee member
791
$a
Ph.D.
792
$a
2007
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3291915
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9111138
電子資源
11.線上閱覽_V
電子書
EB W9111138
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入