Britton et al., 2007 - Google Patents
A security risk measurement for the RAdAC modelBritton et al., 2007
View PDF- Document ID
- 13291223126087863064
- Author
- Britton D
- Brown I
- Publication year
External Links
Snippet
The purpose of this thesis is to provide a quantification process for the risk module of the NSA RAdAC model. The intent is to quantify the risk involved in a single information transaction. Additionally, this thesis will attempt to identify the risk factors involved when …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30386—Retrieval requests
- G06F17/30424—Query processing
- G06F17/30477—Query execution
- G06F17/30507—Applying rules; deductive queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30386—Retrieval requests
- G06F17/30424—Query processing
- G06F17/30533—Other types of queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30587—Details of specialised database models
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/12—Accounting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Farahmand et al. | A management perspective on risk of security threats to information systems | |
| Solomon et al. | Information security illuminated | |
| Krutz et al. | The CISSP Prep Guide: Gold Edition | |
| Kanu et al. | Artificial intelligence and cybercrime in Nigeria: Towards an Ethical framework | |
| Hawkins et al. | Using CobiT to secure information assets | |
| Britton et al. | A security risk measurement for the RAdAC model | |
| US7703123B2 (en) | Method and system for security control in an organization | |
| Tjiptabudi et al. | Information System Security of Indonesia Terrestrial Border Control | |
| Carlson | How to Manage Cybersecurity Risk: A Security Leader's Roadmap with Open FAIR | |
| Karpova et al. | Ensuring the safety of information processes in sociotechnical systems based on an analysis of the behavioral characteristics of a person as a subject of such a system | |
| CN109962882A (en) | A method and system for evaluating the trust level of network identity management services | |
| Celikel et al. | Managing risks in RBAC employed distributed environments | |
| Andrzejewski | Security information management systems | |
| Horan | The Current State of DOD's Cybersecurity Maturity Model Certification Program. | |
| Grimaila et al. | An automated information asset tracking methodology to enable timely cyber incident mission impact assessment | |
| Kavun et al. | Cybersecurity for Critical Infrastructures | |
| Yaroshenko et al. | Legal Protection of Employee Privacy in the Workplace | |
| Al-Suqri et al. | User privacy and security online: the role of information professionals | |
| Moe et al. | Effective security and access control framework for multilevel organizations | |
| Thomas et al. | Recommendations to address government concerns regarding intellectual property theft from American research universities by China and other foreign entities while preserving the process of fundamental research | |
| Murphy et al. | Towards trust-based data weighting in machine learning | |
| Diego | The Analysis of Cyber Security the Extended Cartesian Method Approach With Innovative Study Models | |
| Luesebrink | Institutionalization of Information Security Governance Structures in Academic Institutions: A Case Study | |
| Price | Data Security in Higher Education: Protecting Confidential Financial Aid Data | |
| Pieklo | Improving the quality of information technology (IT) security audits for federal agencies |