Please use this identifier to cite or link to this item: https://hdl.handle.net/20.500.14365/3657
Full metadata record
DC FieldValueLanguage
dc.contributor.authorKondakei S.-
dc.date.accessioned2023-06-16T15:01:53Z-
dc.date.available2023-06-16T15:01:53Z-
dc.date.issued2015-
dc.identifier.isbn978-1-908320-50-6-
dc.identifier.urihttps://doi.org/10.1109/WorldCIS.2015.7359421-
dc.identifier.urihttps://hdl.handle.net/20.500.14365/3657-
dc.descriptionWorld Congress on Internet Security, WorldCIS 2015 -- 19 October 2015 through 21 October 2015 -- 119461en_US
dc.description.abstractUser vigilance and security awareness are two interrelated factors, which we often oversee and merely rely on the default configurations set by the related vendor. User-related mistakes can lead to serious threats to computerized systems. If not performed adequately, system maintenance tasks including backup, restore, patch, upgrade, and malconfigurations can create critical vulnerabilities throughout the Internet. This paper presents a numerical method to analyze the system availability and predict the cost of mistakes (or maloperations) done by users. A reliability-based impact analysis method with a concise formulation can help system administrators to easily capture the risks of human-rooted threats and take the necessary measures to mitigate them. The proposed work can be specially useful for the analysis of threats in social networks. Because social networks are more vulnerable in the sense that they connect a heavily crowded community with relatively low security-awareness, which encompasses a wide spectrum of user applications running on different platforms with different protection profiles. Due to the immense number of interconnections and highly improved communication infrastructures viruses/warms, popups, phishers, and Trojans can easily propagate to millions of users in a few milliseconds of time causing losses that are worth being aware. © 2015 Infonomics Society.en_US
dc.language.isoenen_US
dc.publisherInstitute of Electrical and Electronics Engineers Inc.en_US
dc.relation.ispartof2015 World Congress on Internet Security, WorldCIS 2015en_US
dc.rightsinfo:eu-repo/semantics/closedAccessen_US
dc.subjectreliability and dependabilityen_US
dc.subjectsecurity threat modelingen_US
dc.subjectstochastic risk assessmenten_US
dc.subjectUser-trust modelingen_US
dc.subjectAvailabilityen_US
dc.subjectComputer privacyen_US
dc.subjectInterneten_US
dc.subjectMalwareen_US
dc.subjectNumerical methodsen_US
dc.subjectReliabilityen_US
dc.subjectReliability analysisen_US
dc.subjectRisk assessmenten_US
dc.subjectSecurity of dataen_US
dc.subjectSecurity systemsen_US
dc.subjectSocial networking (online)en_US
dc.subjectStochastic systemsen_US
dc.subjectCommunication infrastructureen_US
dc.subjectComputerized systemsen_US
dc.subjectProtection profileen_US
dc.subjectSecurity awarenessen_US
dc.subjectSecurity threat modelingen_US
dc.subjectSystem availabilityen_US
dc.subjectSystem maintenanceen_US
dc.subjectUser trust modelsen_US
dc.subjectNetwork securityen_US
dc.titleHuman-related IT security: A reliability model for network and computer maintenanceen_US
dc.typeConference Objecten_US
dc.identifier.doi10.1109/WorldCIS.2015.7359421-
dc.identifier.scopus2-s2.0-84967211916en_US
dc.authorscopusid15061511300-
dc.identifier.startpage91en_US
dc.identifier.endpage96en_US
dc.identifier.wosWOS:000376087500013en_US
dc.relation.publicationcategoryKonferans Öğesi - Uluslararası - Kurum Öğretim Elemanıen_US
dc.identifier.scopusqualityN/A-
dc.identifier.wosqualityN/A-
item.grantfulltextreserved-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
item.cerifentitytypePublications-
item.openairetypeConference Object-
item.fulltextWith Fulltext-
item.languageiso639-1en-
crisitem.author.dept05.05. Computer Engineering-
Appears in Collections:Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection
WoS İndeksli Yayınlar Koleksiyonu / WoS Indexed Publications Collection
Files in This Item:
File SizeFormat 
2742.pdf
  Restricted Access
150.08 kBAdobe PDFView/Open    Request a copy
Show simple item record



CORE Recommender

Page view(s)

54
checked on Sep 30, 2024

Download(s)

6
checked on Sep 30, 2024

Google ScholarTM

Check




Altmetric


Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.