Metrics for Mitigating Cybersecurity Threats to Networks
MetadataShow full item record
To achieve their full potential, networks must be secure as well as functional. With this in mind, the author identifies metrics designed to mitigate vulnerabilities to cyberattacks in networks that are key to the critical infrastructure of the US. He discusses both growth metrics — based on data obtained from the US National Institute of Standards and Technology and Department of Homeland Security vulnerability database — and metrics designed to mitigate the risk of security vulnerabilities in networks. If used together, these two types of metrics can help make networks more secure.
The article of record as published may be found at http://dx.doi.org/10.1109/MIC.2010.14
RightsThis publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.
Showing items related by title, author, creator and subject.
Shing, Leslie (Monterey, California: Naval Postgraduate School, 2016-03);Networks are constantly bombarded with malicious or suspicious network traffic by attackers attempting to execute their attack operations. One of the most prevalent types of traffic observed on the network is scanning ...
Berest, Max; Gera, Ralucca; Lukens, Zachary; Martinez, Nicolas L.; McCaleb, Ben (2016);As technology advances, modern networks rapidly evolve. Capturing the dynamic nature of networks and predicting their evolution has been a common focus in network science. This research investigates a social network’s ...
Using Data Envelopment Analysis and Analytical Hierarchy Process to Find Node Influences in a Social Network Fox, William P.; Everton, Sean F. ;In a social network analysis the output provided includes many measures and metrics. For each of these measures and metrics, the output provides the ability to obtain a rank ordering of the nodes in terms of these measures. ...