Risk and the theory of security risk assessment:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Cham
Springer
[2019]
|
Schriftenreihe: | Advanced sciences and technologies for security applications
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | xxiii, 274 Seiten Illustrationen, Diagramme |
ISBN: | 9783030305994 |
ISSN: | 1613-5113 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV046417498 | ||
003 | DE-604 | ||
005 | 20210301 | ||
007 | t | ||
008 | 200211s2019 a||| |||| 00||| eng d | ||
020 | |a 9783030305994 |9 978-3-030-30599-4 | ||
035 | |a (OCoLC)1143826218 | ||
035 | |a (DE-599)BVBBV046417498 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-739 |a DE-29T | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Young, Carl S. |e Verfasser |0 (DE-588)1052392040 |4 aut | |
245 | 1 | 0 | |a Risk and the theory of security risk assessment |c Carl S. Young |
264 | 1 | |a Cham |b Springer |c [2019] | |
300 | |a xxiii, 274 Seiten |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Advanced sciences and technologies for security applications |x 1613-5113 | |
650 | 4 | |a Security Science and Technology | |
650 | 4 | |a Risk Management | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Statistics for Engineering, Physics, Computer Science, Chemistry and Earth Sciences | |
650 | 4 | |a Complex Systems | |
650 | 4 | |a System safety | |
650 | 4 | |a Risk management | |
650 | 4 | |a Computer security | |
650 | 4 | |a Statistics | |
650 | 4 | |a System theory | |
650 | 0 | 7 | |a Sicherheit |0 (DE-588)4054790-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Risikoanalyse |0 (DE-588)4137042-9 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Risikoanalyse |0 (DE-588)4137042-9 |D s |
689 | 0 | 1 | |a Sicherheit |0 (DE-588)4054790-5 |D s |
689 | 0 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-030-30600-7 |
856 | 4 | 2 | |m Digitalisierung UB Passau - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=031829985&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-031829985 |
Datensatz im Suchindex
_version_ | 1804180960813514752 |
---|---|
adam_text | Contents Part I Security Risk Assessment Fundamentals 1 Definitions and Basic Concepts................................................................ 1.1 Introduction to Risk and Risk-Relevance..................................... 1.2 Threat Scenarios and the Components of Risk............................ 1.3 The Risk Meter................................................................................ 1.4 Introduction to Risk Factors........................................................... 1.5 Threat Incidents and Risk Factor-Related Incidents.................... 1.6 Probability v. Potential................................................................... 1.7 The Fundamental Expression of Security Risk............................ 1.8 Absolute, Relative and Residual Security Risk............................ 1.9 Summary.......................................................................................... 3 3 9 11 13 16 17 26 27 30 2 Risk Factors................................................................................................. 2.1 Introduction...................................................................................... 2.2 Definitions and Examples............................................................... 2.3 Apex Risk Factors........................................................................... 2.4 Spatial Risk Factors........................................................................ 2.5 Temporal Risk Factors.................................................................... 2.6 Behavioral Risk
Factors................................................................. 2.7 Complexity Risk Factors................................................................ 2.8 Inter-related Risk Factors............................................................... 2.9 Risk Factor Scale and Stability...................................................... 2.10 Summary..................... 31 31 32 36 39 40 42 43 43 44 47 3 Threat Scenarios......................................................................................... 3.1 Introduction..................................................................................... 3.2 Static Threat Scenarios................................................................... 3.3 Dynamic Threat Scenarios............................................................. 3.4 Behavioral Threat Scenarios.......................................................... 3.5 Complex Threat Scenarios............................................................. 49 49 51 52 52 53 XJX
xx Contents 3.6 3.7 3.8 3.9 3.10 4 Random Threat Scenarios............................................................... Maximum Threat Scenario Risk.................................................... General Threat Scenario Phenomena............................................. A Security Risk Assessment Taxonomy....................................... Summaiy.......................................................................................... 53 54 56 58 60 Risk, In-Depth............................................................................................. 4.1 Introduction...................................................................................... 4.2 Threat Scenario Equivalence and Risk Universality.................... 4.3 Direct and Indirect Assessments of Likelihood............................ 4.4 Sources of Uncertainty in Estimating Likelihood........................ 4.5 Time and Risk................................................................................. 4.6 Risk-Relevance................................................................................ 4.7 The Confluence of Likelihood Risk Factors................................. 4.8 Summary.......................................................................................... 61 61 63 69 71 74 78 79 81 Part II Quantitative Concepts and Methods 5 The (Bare) Essentials of Probability andStatistics................................ 5.1 Introduction...................................................................................... 5.2
Probability........................................................................................ 5.3 Average, Standard Deviation, Variance and Correlation............ 5.4 The Normal and Standard Normal Distributions.......................... 5.5 The Z-Statistic................................................................................. 5.6 Statistical Confidence and the p-value.......................................... 5.7 The Poisson Distribution................................................................ 5.8 Value-at-Risk................................................................................... 5.9 Summary.......................................................................................... 85 85 87 91 93 98 99 106 108 110 6 Identifying and/or QuantifyingRisk-Relevance..................................... 6.1 Introduction....................................................................................... 6.2 Linearity, Non-linearity and Scale................................................. 6.3 Density............................................................................................. 6.4 Trends and Time Series.................................................................. 6.5 Histograms....................................................................................... 6.6 Derivatives and Integrals................................................................ 6.7 Correlation and Correlation Coefficients Revisited..................... 6.8 Exponential Growth, Decay and Half-Value................................ 6.9 Time and
Frequency Domain Measurements............................... 6.10 Summaiy.......................................................................................... Ill Ill 112 120 121 123 125 127 128 132 135 7 Risk Factor Measurements........................................................................ 7.1 Introduction...................................................................................... 7.2 Spatial Risk Factor Measurements................................................. 7.3 Temporal Risk Factor Measurements............................................ 7.4 Behavioral Risk Factor Measurements.......................................... 137 137 138 148 152
Contents 7.5 7.6 8 Multiple Risk Factors and Uncertainty in Security Risk Management.................................................................................... Summary.......................................................................................... Elementary Stochastic Methods and Security Risk................................ 8.1 Introduction...................................................................................... 8.2 Probability Distributions and Uncertainty.................................... 8.3 Indicative Probability Calculations................................................ 8.4 The Random Walk.......................................................................... 8.5 The Probability of Protection......................................................... 8.6 The Markov Process....................................................................... 8.7 Time-Correlation Functions and Threat Scenario Stability.... 8.8 The Convergence of Probability and Potential............................. 8.9 Summary.......................................................................................... Part III 9 xxi 153 155 157 157 160 163 171 172 175 179 185 187 Security Risk Assessment and Management Threat Scenario Complexity....................................................................... 9.1 Introduction to Complexity............................................................ 9.2 Background...................................................................................... 9.3 Complexity
Combinatorics............................................................ 9.4 Information Entropy........................................................................ 9.5 Estimates of Threat Scenario Complexity.................................... 9.6 Complexity Metrics........................................................................ 9.7 Temporal Limits on Complexity................................................... 9.8 Managing Threat Scenario Complexity........................................ 9.9 Summary.......................................................................................... 10 Systemic Security Risk............................................................................... 10.1 Introduction...................................................................................... 10.2 The Risk-Relevance of Assets and Time...................................... 10.3 Spatial Distribution of Risk Factors: Concentration and Proliferation..................................................................................... 10.3.1 Concentration.................................................................... 10.3.2 Proliferation...................................................................... 10.4 Temporal History of Risk Factors: Persistence, Transience and Trending........................................................................................... 10.4.1 Persistence......................................................................... 10.4.2 Transience......................................................................... 10.4.3
Trending............................................................................ 10.5 Summary.......................................................................................... 191 191 192 195 200 207 212 215 216 218 221 221 222 223 223 224 224 225 226 227 228 11 General Theoretical Results........................................................................ 231 11.1 Introduction..................................................................................... 231 11.2 Core Principles................................................................................ 231 11.3 Random Threat Scenario Results.................................................. 234
xxii Contents 11.4 11.5 11.6 Static and Dynamic Threat Scenario Results................................ Complex Threat Scenario Results.................................................. Summary............................................................... 235 237 239 12 The Theory, in Practice............................................................................. 241 241 242 12.1 12.2 12.3 Introduction...................................................................................... The Security Risk Management Process....................................... Applying the Theory (1): Information Security Threat Scenarios............................................................... 12.4 Applying the Theory (2): Password Cracking.............................. 12.5 A Revised Fundamental Expression of Security Risk................. 12.6 Testing for Encryption.................................................................... 12.7 The Security Control/Risk Factor Ratio (C/R)............................. 12.8 Cost and Constraints in Security Risk Management.................... 12.9 Low Likelihood-High Impact Threat Scenarios........................... 12.10 Summary.......................................................................................... 246 251 257 260 260 261 262 264 Epilogue................................................................................................................. 267 Appendices............................................................................................................ 270
|
any_adam_object | 1 |
author | Young, Carl S. |
author_GND | (DE-588)1052392040 |
author_facet | Young, Carl S. |
author_role | aut |
author_sort | Young, Carl S. |
author_variant | c s y cs csy |
building | Verbundindex |
bvnumber | BV046417498 |
classification_rvk | ST 277 |
ctrlnum | (OCoLC)1143826218 (DE-599)BVBBV046417498 |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01902nam a2200481zc 4500</leader><controlfield tag="001">BV046417498</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20210301 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">200211s2019 a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783030305994</subfield><subfield code="9">978-3-030-30599-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1143826218</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046417498</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-739</subfield><subfield code="a">DE-29T</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Young, Carl S.</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1052392040</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Risk and the theory of security risk assessment</subfield><subfield code="c">Carl S. Young</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield><subfield code="c">[2019]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xxiii, 274 Seiten</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Advanced sciences and technologies for security applications</subfield><subfield code="x">1613-5113</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security Science and Technology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Risk Management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Statistics for Engineering, Physics, Computer Science, Chemistry and Earth Sciences</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Complex Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">System safety</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Risk management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Statistics </subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">System theory</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Risikoanalyse</subfield><subfield code="0">(DE-588)4137042-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Risikoanalyse</subfield><subfield code="0">(DE-588)4137042-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-030-30600-7</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=031829985&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031829985</subfield></datafield></record></collection> |
id | DE-604.BV046417498 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:44:04Z |
institution | BVB |
isbn | 9783030305994 |
issn | 1613-5113 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031829985 |
oclc_num | 1143826218 |
open_access_boolean | |
owner | DE-739 DE-29T |
owner_facet | DE-739 DE-29T |
physical | xxiii, 274 Seiten Illustrationen, Diagramme |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | Springer |
record_format | marc |
series2 | Advanced sciences and technologies for security applications |
spelling | Young, Carl S. Verfasser (DE-588)1052392040 aut Risk and the theory of security risk assessment Carl S. Young Cham Springer [2019] xxiii, 274 Seiten Illustrationen, Diagramme txt rdacontent n rdamedia nc rdacarrier Advanced sciences and technologies for security applications 1613-5113 Security Science and Technology Risk Management Systems and Data Security Statistics for Engineering, Physics, Computer Science, Chemistry and Earth Sciences Complex Systems System safety Risk management Computer security Statistics System theory Sicherheit (DE-588)4054790-5 gnd rswk-swf Risikoanalyse (DE-588)4137042-9 gnd rswk-swf Risikoanalyse (DE-588)4137042-9 s Sicherheit (DE-588)4054790-5 s DE-604 Erscheint auch als Online-Ausgabe 978-3-030-30600-7 Digitalisierung UB Passau - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=031829985&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Young, Carl S. Risk and the theory of security risk assessment Security Science and Technology Risk Management Systems and Data Security Statistics for Engineering, Physics, Computer Science, Chemistry and Earth Sciences Complex Systems System safety Risk management Computer security Statistics System theory Sicherheit (DE-588)4054790-5 gnd Risikoanalyse (DE-588)4137042-9 gnd |
subject_GND | (DE-588)4054790-5 (DE-588)4137042-9 |
title | Risk and the theory of security risk assessment |
title_auth | Risk and the theory of security risk assessment |
title_exact_search | Risk and the theory of security risk assessment |
title_full | Risk and the theory of security risk assessment Carl S. Young |
title_fullStr | Risk and the theory of security risk assessment Carl S. Young |
title_full_unstemmed | Risk and the theory of security risk assessment Carl S. Young |
title_short | Risk and the theory of security risk assessment |
title_sort | risk and the theory of security risk assessment |
topic | Security Science and Technology Risk Management Systems and Data Security Statistics for Engineering, Physics, Computer Science, Chemistry and Earth Sciences Complex Systems System safety Risk management Computer security Statistics System theory Sicherheit (DE-588)4054790-5 gnd Risikoanalyse (DE-588)4137042-9 gnd |
topic_facet | Security Science and Technology Risk Management Systems and Data Security Statistics for Engineering, Physics, Computer Science, Chemistry and Earth Sciences Complex Systems System safety Risk management Computer security Statistics System theory Sicherheit Risikoanalyse |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=031829985&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT youngcarls riskandthetheoryofsecurityriskassessment |