[go: up one dir, main page]

Britton et al., 2007 - Google Patents

A security risk measurement for the RAdAC model

Britton et al., 2007

View PDF
Document ID
13291223126087863064
Author
Britton D
Brown I
Publication year

External Links

Snippet

The purpose of this thesis is to provide a quantification process for the risk module of the NSA RAdAC model. The intent is to quantify the risk involved in a single information transaction. Additionally, this thesis will attempt to identify the risk factors involved when …
Continue reading at apps.dtic.mil (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30386Retrieval requests
    • G06F17/30424Query processing
    • G06F17/30477Query execution
    • G06F17/30507Applying rules; deductive queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30386Retrieval requests
    • G06F17/30424Query processing
    • G06F17/30533Other types of queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30587Details of specialised database models
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/12Accounting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect

Similar Documents

Publication Publication Date Title
Farahmand et al. A management perspective on risk of security threats to information systems
Solomon et al. Information security illuminated
Krutz et al. The CISSP Prep Guide: Gold Edition
Kanu et al. Artificial intelligence and cybercrime in Nigeria: Towards an Ethical framework
Hawkins et al. Using CobiT to secure information assets
Britton et al. A security risk measurement for the RAdAC model
US7703123B2 (en) Method and system for security control in an organization
Tjiptabudi et al. Information System Security of Indonesia Terrestrial Border Control
Carlson How to Manage Cybersecurity Risk: A Security Leader's Roadmap with Open FAIR
Karpova et al. Ensuring the safety of information processes in sociotechnical systems based on an analysis of the behavioral characteristics of a person as a subject of such a system
CN109962882A (en) A method and system for evaluating the trust level of network identity management services
Celikel et al. Managing risks in RBAC employed distributed environments
Andrzejewski Security information management systems
Horan The Current State of DOD's Cybersecurity Maturity Model Certification Program.
Grimaila et al. An automated information asset tracking methodology to enable timely cyber incident mission impact assessment
Kavun et al. Cybersecurity for Critical Infrastructures
Yaroshenko et al. Legal Protection of Employee Privacy in the Workplace
Al-Suqri et al. User privacy and security online: the role of information professionals
Moe et al. Effective security and access control framework for multilevel organizations
Thomas et al. Recommendations to address government concerns regarding intellectual property theft from American research universities by China and other foreign entities while preserving the process of fundamental research
Murphy et al. Towards trust-based data weighting in machine learning
Diego The Analysis of Cyber Security the Extended Cartesian Method Approach With Innovative Study Models
Luesebrink Institutionalization of Information Security Governance Structures in Academic Institutions: A Case Study
Price Data Security in Higher Education: Protecting Confidential Financial Aid Data
Pieklo Improving the quality of information technology (IT) security audits for federal agencies