Risk Propagation Assessment for Network Security Risk Propagation Assessment for Network Security

Risk Propagation Assessment for Network Security

Application to Airport Communication Network Design

    • 139,99 €
    • 139,99 €

Description de l’éditeur

The focus of this book is risk assessment methodologies for network architecture design. The main goal is to present and illustrate an innovative risk propagation-based quantitative assessment tool. This original approach aims to help network designers and security administrators to design and build more robust and secure network topologies. As an implementation case study, the authors consider an aeronautical network based on AeroMACS (Aeronautical Mobile Airport Communications System) technology. AeroMACS has been identified as the wireless access network for airport surface communications that will soon be deployed in European and American airports mainly for communications between aircraft and airlines. It is based on the IEEE 802.16-2009 standard, also known as WiMAX.

The book begins with an introduction to the information system security risk management process, before moving on to present the different risk management methodologies that can be currently used (quantitative and qualitative). In the third part of the book, the authors' original quantitative network risk assessment model based on risk propagation is introduced. Finally, a network case study of the future airport AeroMACS system is presented. This example illustrates how the authors' quantitative risk assessment proposal can provide help to network security designers for the decision-making process and how the security of the entire network may thus be improved.

GENRE
Professionnel et technique
SORTIE
2013
8 avril
LANGUE
EN
Anglais
LONGUEUR
144
Pages
ÉDITIONS
Wiley
DÉTAILS DU FOURNISSEUR
John Wiley & Sons Ltd
TAILLE
2
Mo
Security and Privacy in Cyberspace Security and Privacy in Cyberspace
2022
Recent Advancements in ICT Infrastructure and Applications Recent Advancements in ICT Infrastructure and Applications
2022
Attacks and Defenses for the Internet-of-Things Attacks and Defenses for the Internet-of-Things
2022