Human-Related It Security: a Reliability Model for Network and Computer Maintenance

Loading...
Publication Logo

Date

2015

Authors

Kondakei S.

Journal Title

Journal ISSN

Volume Title

Publisher

Institute of Electrical and Electronics Engineers Inc.

Open Access Color

Green Open Access

No

OpenAIRE Downloads

OpenAIRE Views

Publicly Funded

No
Impulse
Average
Influence
Average
Popularity
Average

Research Projects

Journal Issue

Abstract

User vigilance and security awareness are two interrelated factors, which we often oversee and merely rely on the default configurations set by the related vendor. User-related mistakes can lead to serious threats to computerized systems. If not performed adequately, system maintenance tasks including backup, restore, patch, upgrade, and malconfigurations can create critical vulnerabilities throughout the Internet. This paper presents a numerical method to analyze the system availability and predict the cost of mistakes (or maloperations) done by users. A reliability-based impact analysis method with a concise formulation can help system administrators to easily capture the risks of human-rooted threats and take the necessary measures to mitigate them. The proposed work can be specially useful for the analysis of threats in social networks. Because social networks are more vulnerable in the sense that they connect a heavily crowded community with relatively low security-awareness, which encompasses a wide spectrum of user applications running on different platforms with different protection profiles. Due to the immense number of interconnections and highly improved communication infrastructures viruses/warms, popups, phishers, and Trojans can easily propagate to millions of users in a few milliseconds of time causing losses that are worth being aware. © 2015 Infonomics Society.

Description

World Congress on Internet Security, WorldCIS 2015 -- 19 October 2015 through 21 October 2015 -- 119461

Keywords

reliability and dependability, security threat modeling, stochastic risk assessment, User-trust modeling, Availability, Computer privacy, Internet, Malware, Numerical methods, Reliability, Reliability analysis, Risk assessment, Security of data, Security systems, Social networking (online), Stochastic systems, Communication infrastructure, Computerized systems, Protection profile, Security awareness, Security threat modeling, System availability, System maintenance, User trust models, Network security

Fields of Science

0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology, 0101 mathematics, 01 natural sciences

Citation

WoS Q

N/A

Scopus Q

N/A
OpenCitations Logo
OpenCitations Citation Count
N/A

Source

2015 World Congress on Internet Security, WorldCIS 2015

Volume

Issue

Start Page

91

End Page

96
PlumX Metrics
Citations

Scopus : 0

Captures

Mendeley Readers : 15

Google Scholar Logo
Google Scholar™
OpenAlex Logo
OpenAlex FWCI
0.0

Sustainable Development Goals