Please use this identifier to cite or link to this item:
https://hdl.handle.net/20.500.14365/3657
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kondakei S. | - |
dc.date.accessioned | 2023-06-16T15:01:53Z | - |
dc.date.available | 2023-06-16T15:01:53Z | - |
dc.date.issued | 2015 | - |
dc.identifier.isbn | 978-1-908320-50-6 | - |
dc.identifier.uri | https://doi.org/10.1109/WorldCIS.2015.7359421 | - |
dc.identifier.uri | https://hdl.handle.net/20.500.14365/3657 | - |
dc.description | World Congress on Internet Security, WorldCIS 2015 -- 19 October 2015 through 21 October 2015 -- 119461 | en_US |
dc.description.abstract | User vigilance and security awareness are two interrelated factors, which we often oversee and merely rely on the default configurations set by the related vendor. User-related mistakes can lead to serious threats to computerized systems. If not performed adequately, system maintenance tasks including backup, restore, patch, upgrade, and malconfigurations can create critical vulnerabilities throughout the Internet. This paper presents a numerical method to analyze the system availability and predict the cost of mistakes (or maloperations) done by users. A reliability-based impact analysis method with a concise formulation can help system administrators to easily capture the risks of human-rooted threats and take the necessary measures to mitigate them. The proposed work can be specially useful for the analysis of threats in social networks. Because social networks are more vulnerable in the sense that they connect a heavily crowded community with relatively low security-awareness, which encompasses a wide spectrum of user applications running on different platforms with different protection profiles. Due to the immense number of interconnections and highly improved communication infrastructures viruses/warms, popups, phishers, and Trojans can easily propagate to millions of users in a few milliseconds of time causing losses that are worth being aware. © 2015 Infonomics Society. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | en_US |
dc.relation.ispartof | 2015 World Congress on Internet Security, WorldCIS 2015 | en_US |
dc.rights | info:eu-repo/semantics/closedAccess | en_US |
dc.subject | reliability and dependability | en_US |
dc.subject | security threat modeling | en_US |
dc.subject | stochastic risk assessment | en_US |
dc.subject | User-trust modeling | en_US |
dc.subject | Availability | en_US |
dc.subject | Computer privacy | en_US |
dc.subject | Internet | en_US |
dc.subject | Malware | en_US |
dc.subject | Numerical methods | en_US |
dc.subject | Reliability | en_US |
dc.subject | Reliability analysis | en_US |
dc.subject | Risk assessment | en_US |
dc.subject | Security of data | en_US |
dc.subject | Security systems | en_US |
dc.subject | Social networking (online) | en_US |
dc.subject | Stochastic systems | en_US |
dc.subject | Communication infrastructure | en_US |
dc.subject | Computerized systems | en_US |
dc.subject | Protection profile | en_US |
dc.subject | Security awareness | en_US |
dc.subject | Security threat modeling | en_US |
dc.subject | System availability | en_US |
dc.subject | System maintenance | en_US |
dc.subject | User trust models | en_US |
dc.subject | Network security | en_US |
dc.title | Human-related IT security: A reliability model for network and computer maintenance | en_US |
dc.type | Conference Object | en_US |
dc.identifier.doi | 10.1109/WorldCIS.2015.7359421 | - |
dc.identifier.scopus | 2-s2.0-84967211916 | en_US |
dc.authorscopusid | 15061511300 | - |
dc.identifier.startpage | 91 | en_US |
dc.identifier.endpage | 96 | en_US |
dc.identifier.wos | WOS:000376087500013 | en_US |
dc.relation.publicationcategory | Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı | en_US |
dc.identifier.scopusquality | N/A | - |
dc.identifier.wosquality | N/A | - |
item.grantfulltext | reserved | - |
item.openairetype | Conference Object | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.fulltext | With Fulltext | - |
item.languageiso639-1 | en | - |
item.cerifentitytype | Publications | - |
crisitem.author.dept | 05.05. Computer Engineering | - |
Appears in Collections: | Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection WoS İndeksli Yayınlar Koleksiyonu / WoS Indexed Publications Collection |
Files in This Item:
File | Size | Format | |
---|---|---|---|
2742.pdf Restricted Access | 150.08 kB | Adobe PDF | View/Open Request a copy |
CORE Recommender
Page view(s)
60
checked on Nov 18, 2024
Download(s)
6
checked on Nov 18, 2024
Google ScholarTM
Check
Altmetric
Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.