Risk-based security management in critical infrastructure organizations:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Abschlussarbeit Buch |
Sprache: | English |
Veröffentlicht: |
Passau
2021
|
Schlagworte: | |
Online-Zugang: | Volltext Volltext Inhaltsverzeichnis |
Beschreibung: | xii, 181 Seiten |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV047605703 | ||
003 | DE-604 | ||
005 | 20211221 | ||
007 | t | ||
008 | 211122s2021 m||| 00||| eng d | ||
035 | |a (OCoLC)1289776782 | ||
035 | |a (DE-599)BVBBV047605703 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-384 |a DE-473 |a DE-703 |a DE-1051 |a DE-824 |a DE-29 |a DE-12 |a DE-91 |a DE-19 |a DE-1049 |a DE-92 |a DE-739 |a DE-898 |a DE-355 |a DE-706 |a DE-20 |a DE-1102 |a DE-860 |a DE-2174 | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Alshawish, Ali |d ca. 20./21. Jh. |e Verfasser |0 (DE-588)1248269829 |4 aut | |
245 | 1 | 0 | |a Risk-based security management in critical infrastructure organizations |c Ali Alshawish |
264 | 1 | |a Passau |c 2021 | |
300 | |a xii, 181 Seiten | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
502 | |b Dissertation |c Universität Passau |d 2021 | ||
650 | 0 | 7 | |a Spieltheorie |0 (DE-588)4056243-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kritische Infrastruktur |0 (DE-588)7636249-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4113937-9 |a Hochschulschrift |2 gnd-content | |
689 | 0 | 0 | |a Spieltheorie |0 (DE-588)4056243-8 |D s |
689 | 0 | 1 | |a Kritische Infrastruktur |0 (DE-588)7636249-8 |D s |
689 | 0 | 2 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |o urn:nbn:de:bvb:739-opus4-10026 |
856 | 4 | 1 | |u https://opus4.kobv.de/opus4-uni-passau/frontdoor/index/index/docId/1002 |z kostenfrei |3 Volltext |
856 | 4 | 1 | |u https://nbn-resolving.de/urn:nbn:de:bvb:739-opus4-10026 |x Resolving-System |z kostenfrei |3 Volltext |
856 | 4 | 2 | |m Digitalisierung UB Passau - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032990714&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
912 | |a ebook | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-032990714 |
Datensatz im Suchindex
_version_ | 1804182969386008576 |
---|---|
adam_text | CONTENTS LISTS X List of Figures.......................................................................................................... x List of Tables............................................................................................................. xi ACRONYMS ХІІ I SECURITY MANAGEMENT 1 INTRODUCTION 3 1.1 Overview of Security Management............................................................... 3 1.2 Characteristics of Security Management Problems..................................... 4 1.3 Contributions of This Thesis........................................................................... 6 1.4 Thesis Structure............................................................................................... 9 2 BACKGROUND AND RELATED WORK 11 2.1 Critical Infrastructure Systems........................................................................ 11 2.2 Risk and Decision Making................................................................................. 12 2.2.1 What is risk? ..........................................................................................12 2.2.2 What is risk attitude? ........................................................................... 13 2.2.3 Decision-making under risk...................................................................15 2.3 Game Theory for Security................................................................................. 17 2.3.1 Surveillance games................................................................................. 18 2.3.2 Prioritization
games.............................................................................. 19 2.3.3 Cyber insurance games........................................................................ 21 2.4 Assumptions........................................................................................................21 3 THE EXTENDED PERIMETER OF CRITICAL INFRASTRUCTURES 23 3.1 Beyond Traditional Borders.............................................................................. 23 3.2 De-perimeterisation versus Re-perimeterisation............................................24 3.3 Assumptions underlying Perimeter Security Models ....................................25 3.4 What is a Security Perimeter?........................................................................... 29 3.4.1 Structure of a security perimeter.......................................................... 30 3.4.2 Nature and function of security perimeter.........................................30 3.4.3 Non-extended perimeter components................................................. 31 3.5 Identifying Extended Perimeter Components of Cl Systems........................32 3.5.1 Unattended infrastructures...................................................................32 3.5.2 Trends and technology populism ............................... 33 3.5.3 Outsourcing............................................................................................ 34 3.5.4 Human factor..........................................................................................34 3.6 Classification of Security Incident
Causes....................................................... 35 3.7 Summary..............................................................................................................37 4 RISK-BASED SECURITY MANAGEMENT: A METHODOLOGICAL APPROACH 39 4.1 Game-theoretic Approach for Risk-based Security Management..................39 4.1.1 Game theory principles........................................................................ 39 4.1.2 Security management games................................................................41 4.2 A Methodological Approach for Security Management................................ 46 4.2.1 Context establishment............................................................................47 vii
viii CONTENTS 4.3 4.4 4.2.2 Identification of strategies..................................................................... 49 4.2.3 Identification of goals........................................................................... 49 4.2.4 Effectiveness assessment........................................................................ 50 4.2.5 Identification of best response (strategies)............................................51 4.2.6 Implementation of best response..........................................................52 Techniques and Methods....................................................................................52 Summary............................................................................................................. 54 II PHYSICAL SECURITY MANAGEMENT 5 PHYSICAL SURVEILLANCE GAMES 57 5.1 Introduction........................................................................................................57 5.2 Overview of Surveillance .................................................................................58 5.2.1 Categorization ...................................................................................... 58 5.2.2 Limitations ............................................................................................ 59 5.3 Physical Surveillance Games ........................................................................... 60 5.3.1 Challenges of physical surveillance.................................................... 60 5.3.2 Basic model of physical surveillance games.........................................61 5.3.3
Generalized model of physical surveillance games .......................... 62 5.4 Entropy-based Model for Quantifying Location Privacy................................ 63 5.4.1 Static model............................................................................................ 63 5.4.2 Time-based model.................................................................................67 5.5 Summary............................................................................................................. 71 6 use case 73 6.1 Introduction...................................................... 73 6.2 Context Establishment.......................................................................................73 6.3 Identification of Strategies.................................................................................75 6.4 Identification of Goals.......................................................................................76 6.5 Effectiveness Assessment .................................................................................78 6.5.1 Simulation setup....................................................................................79 6.5.2 Assessment results.................................................................................85 6.6 Identification of Best Response........................................................................ 88 6.7 Summary............................................................................................................. 88 EVALUATION AND COMPARATIVE ANALYSIS 7.1 7.2 7.3 7.4 7.5 III 8 93
Introduction.................................................................................................... 93 Classical Game Model.......................................................................................94 Quasi-purification and Effectiveness Assessment............................................96 A Comparative Analysis....................................................................................97 7.4.1 First dimension: mixed-strategy-extended games............................. 97 7.4.2 Second dimension: distance measures (closeness to the ideal point) 101 7.4.3 Third dimension: graphical comparison.............................................102 7.4.4 Fourth dimension: disappointment rate.............................................103 Summary............................................................................................................105 CYBERSECURITY MANAGEMENT CYBERSECURITY GAMES I09 8.1 Introduction...................................................................................................... 109 8.2 Stochastic Time-To-Compromise Model......................................................... 111
CONTENTS 8.3 Cybersecurity Game........................................................................................115 8.4 Prioritization Framework ............................................................................... 116 8.4.1 Context establishment......................................................................... 116 8.4.2 Identification of strategies....................................................................117 8.4.3 Identification of goals......................................................................... 118 8.4.4 Effectiveness assessment...................................................................... 118 8.4.5 Prioritization process of the defense strategies................................. 119 8.5 Summary............................................................................................................119 9 use case 121 9.1 Introduction...................................................................................................... 121 9.2 Context Establishment.....................................................................................121 9.3 Identification of Strategies............................................................................... 123 9.3.1 Identification of potential attack strategies....................................... 123 9.3.2 Identification of possible defense strategies....................................... 124 9.4 Effectiveness Assessment ............................................................................... 123 9.5 Prioritization Process of Defense
Strategies.................................................. 125 9.6 Evaluation of Obtained Prioritization Options.............................................128 9.7 Summary............................................................................................................131 10 TWEAKABLE STOCHASTIC ORDER FOR CYBERINSURANCES I33 10.1 Introduction...................................................................................................... 133 10.2 Tweakable Stochastic Order............................................................................ 133 10.2.1 Approach............................................................................................. 135 10.2.2 Tailoring the ordering to subjectiverisk attitudes.............................136 10.2.3 Defining the ordering..........................................................................137 10.3 Cyber Risk and Insurance: a Use Case........................................................... 138 10.3.1 Game model...........................................................................................138 10.3.2 Practical use and meaning of the lexicographic Nash equilibrium . 140 10.3.3 Equilibrium computation....................................................................140 10.3.4 Example................................................................................................ 142 10.4 Quality Analysis ............................................................................................. 144 10.4.1 The insurer............................................................ 145
10.4.2 The customer........................................................................................147 10.5 Summary............................................................................................................147 Conclusions, Appendix, and Bibliography 11 CONCLUSION AND OUTLOOK I53 11.1 The Lexicographic Paradox............................................................................ 153 11.2 Contributions and Results............................................................................... 155 11.3 Outlook on Future Research............................................................................ 158 A APPENDIX l6l A.i Fictitious Play in a Two-person Zero-sum Game with Distribution-valued Payoffs...............................................................................................................161 a.2 Derivation of ET Equation............................................................................... 162 BIBLIOGRAPHY 165 Publications by the Author........................................................................................165 References..................................................................................................................166 ІХ
|
adam_txt |
CONTENTS LISTS X List of Figures. x List of Tables. xi ACRONYMS ХІІ I SECURITY MANAGEMENT 1 INTRODUCTION 3 1.1 Overview of Security Management. 3 1.2 Characteristics of Security Management Problems. 4 1.3 Contributions of This Thesis. 6 1.4 Thesis Structure. 9 2 BACKGROUND AND RELATED WORK 11 2.1 Critical Infrastructure Systems. 11 2.2 Risk and Decision Making. 12 2.2.1 What is risk? .12 2.2.2 What is risk attitude? . 13 2.2.3 Decision-making under risk.15 2.3 Game Theory for Security. 17 2.3.1 Surveillance games. 18 2.3.2 Prioritization
games. 19 2.3.3 Cyber insurance games. 21 2.4 Assumptions.21 3 THE EXTENDED PERIMETER OF CRITICAL INFRASTRUCTURES 23 3.1 Beyond Traditional Borders. 23 3.2 De-perimeterisation versus Re-perimeterisation.24 3.3 Assumptions underlying Perimeter Security Models .25 3.4 What is a Security Perimeter?. 29 3.4.1 Structure of a security perimeter. 30 3.4.2 Nature and function of security perimeter.30 3.4.3 Non-extended perimeter components. 31 3.5 Identifying Extended Perimeter Components of Cl Systems.32 3.5.1 Unattended infrastructures.32 3.5.2 Trends and technology populism . 33 3.5.3 Outsourcing. 34 3.5.4 Human factor.34 3.6 Classification of Security Incident
Causes. 35 3.7 Summary.37 4 RISK-BASED SECURITY MANAGEMENT: A METHODOLOGICAL APPROACH 39 4.1 Game-theoretic Approach for Risk-based Security Management.39 4.1.1 Game theory principles. 39 4.1.2 Security management games.41 4.2 A Methodological Approach for Security Management. 46 4.2.1 Context establishment.47 vii
viii CONTENTS 4.3 4.4 4.2.2 Identification of strategies. 49 4.2.3 Identification of goals. 49 4.2.4 Effectiveness assessment. 50 4.2.5 Identification of best response (strategies).51 4.2.6 Implementation of best response.52 Techniques and Methods.52 Summary. 54 II PHYSICAL SECURITY MANAGEMENT 5 PHYSICAL SURVEILLANCE GAMES 57 5.1 Introduction.57 5.2 Overview of Surveillance .58 5.2.1 Categorization . 58 5.2.2 Limitations . 59 5.3 Physical Surveillance Games . 60 5.3.1 Challenges of physical surveillance. 60 5.3.2 Basic model of physical surveillance games.61 5.3.3
Generalized model of physical surveillance games . 62 5.4 Entropy-based Model for Quantifying Location Privacy. 63 5.4.1 Static model. 63 5.4.2 Time-based model.67 5.5 Summary. 71 6 use case 73 6.1 Introduction. 73 6.2 Context Establishment.73 6.3 Identification of Strategies.75 6.4 Identification of Goals.76 6.5 Effectiveness Assessment .78 6.5.1 Simulation setup.79 6.5.2 Assessment results.85 6.6 Identification of Best Response. 88 6.7 Summary. 88 EVALUATION AND COMPARATIVE ANALYSIS 7.1 7.2 7.3 7.4 7.5 III 8 93
Introduction. 93 Classical Game Model.94 Quasi-purification and Effectiveness Assessment.96 A Comparative Analysis.97 7.4.1 First dimension: mixed-strategy-extended games. 97 7.4.2 Second dimension: distance measures (closeness to the ideal point) 101 7.4.3 Third dimension: graphical comparison.102 7.4.4 Fourth dimension: disappointment rate.103 Summary.105 CYBERSECURITY MANAGEMENT CYBERSECURITY GAMES I09 8.1 Introduction. 109 8.2 Stochastic Time-To-Compromise Model. 111
CONTENTS 8.3 Cybersecurity Game.115 8.4 Prioritization Framework . 116 8.4.1 Context establishment. 116 8.4.2 Identification of strategies.117 8.4.3 Identification of goals. 118 8.4.4 Effectiveness assessment. 118 8.4.5 Prioritization process of the defense strategies. 119 8.5 Summary.119 9 use case 121 9.1 Introduction. 121 9.2 Context Establishment.121 9.3 Identification of Strategies. 123 9.3.1 Identification of potential attack strategies. 123 9.3.2 Identification of possible defense strategies. 124 9.4 Effectiveness Assessment . 123 9.5 Prioritization Process of Defense
Strategies. 125 9.6 Evaluation of Obtained Prioritization Options.128 9.7 Summary.131 10 TWEAKABLE STOCHASTIC ORDER FOR CYBERINSURANCES I33 10.1 Introduction. 133 10.2 Tweakable Stochastic Order. 133 10.2.1 Approach. 135 10.2.2 Tailoring the ordering to subjectiverisk attitudes.136 10.2.3 Defining the ordering.137 10.3 Cyber Risk and Insurance: a Use Case. 138 10.3.1 Game model.138 10.3.2 Practical use and meaning of the lexicographic Nash equilibrium . 140 10.3.3 Equilibrium computation.140 10.3.4 Example. 142 10.4 Quality Analysis . 144 10.4.1 The insurer. 145
10.4.2 The customer.147 10.5 Summary.147 Conclusions, Appendix, and Bibliography 11 CONCLUSION AND OUTLOOK I53 11.1 The Lexicographic Paradox. 153 11.2 Contributions and Results. 155 11.3 Outlook on Future Research. 158 A APPENDIX l6l A.i Fictitious Play in a Two-person Zero-sum Game with Distribution-valued Payoffs.161 a.2 Derivation of ET Equation. 162 BIBLIOGRAPHY 165 Publications by the Author.165 References.166 ІХ |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Alshawish, Ali ca. 20./21. Jh |
author_GND | (DE-588)1248269829 |
author_facet | Alshawish, Ali ca. 20./21. Jh |
author_role | aut |
author_sort | Alshawish, Ali ca. 20./21. Jh |
author_variant | a a aa |
building | Verbundindex |
bvnumber | BV047605703 |
classification_rvk | ST 277 |
collection | ebook |
ctrlnum | (OCoLC)1289776782 (DE-599)BVBBV047605703 |
discipline | Informatik |
discipline_str_mv | Informatik |
format | Thesis Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02020nam a2200421 c 4500</leader><controlfield tag="001">BV047605703</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20211221 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">211122s2021 m||| 00||| eng d</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1289776782</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047605703</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-384</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-1051</subfield><subfield code="a">DE-824</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-12</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-1049</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-355</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-1102</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-2174</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Alshawish, Ali</subfield><subfield code="d">ca. 20./21. Jh.</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1248269829</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Risk-based security management in critical infrastructure organizations</subfield><subfield code="c">Ali Alshawish</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Passau</subfield><subfield code="c">2021</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xii, 181 Seiten</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="502" ind1=" " ind2=" "><subfield code="b">Dissertation</subfield><subfield code="c">Universität Passau</subfield><subfield code="d">2021</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Spieltheorie</subfield><subfield code="0">(DE-588)4056243-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kritische Infrastruktur</subfield><subfield code="0">(DE-588)7636249-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4113937-9</subfield><subfield code="a">Hochschulschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Spieltheorie</subfield><subfield code="0">(DE-588)4056243-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Kritische Infrastruktur</subfield><subfield code="0">(DE-588)7636249-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="o">urn:nbn:de:bvb:739-opus4-10026</subfield></datafield><datafield tag="856" ind1="4" ind2="1"><subfield code="u">https://opus4.kobv.de/opus4-uni-passau/frontdoor/index/index/docId/1002</subfield><subfield code="z">kostenfrei</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="1"><subfield code="u">https://nbn-resolving.de/urn:nbn:de:bvb:739-opus4-10026</subfield><subfield code="x">Resolving-System</subfield><subfield code="z">kostenfrei</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032990714&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ebook</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032990714</subfield></datafield></record></collection> |
genre | (DE-588)4113937-9 Hochschulschrift gnd-content |
genre_facet | Hochschulschrift |
id | DE-604.BV047605703 |
illustrated | Not Illustrated |
index_date | 2024-07-03T18:38:09Z |
indexdate | 2024-07-10T09:15:59Z |
institution | BVB |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032990714 |
oclc_num | 1289776782 |
open_access_boolean | 1 |
owner | DE-384 DE-473 DE-BY-UBG DE-703 DE-1051 DE-824 DE-29 DE-12 DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-1049 DE-92 DE-739 DE-898 DE-BY-UBR DE-355 DE-BY-UBR DE-706 DE-20 DE-1102 DE-860 DE-2174 |
owner_facet | DE-384 DE-473 DE-BY-UBG DE-703 DE-1051 DE-824 DE-29 DE-12 DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-1049 DE-92 DE-739 DE-898 DE-BY-UBR DE-355 DE-BY-UBR DE-706 DE-20 DE-1102 DE-860 DE-2174 |
physical | xii, 181 Seiten |
psigel | ebook |
publishDate | 2021 |
publishDateSearch | 2021 |
publishDateSort | 2021 |
record_format | marc |
spelling | Alshawish, Ali ca. 20./21. Jh. Verfasser (DE-588)1248269829 aut Risk-based security management in critical infrastructure organizations Ali Alshawish Passau 2021 xii, 181 Seiten txt rdacontent n rdamedia nc rdacarrier Dissertation Universität Passau 2021 Spieltheorie (DE-588)4056243-8 gnd rswk-swf Kritische Infrastruktur (DE-588)7636249-8 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf (DE-588)4113937-9 Hochschulschrift gnd-content Spieltheorie (DE-588)4056243-8 s Kritische Infrastruktur (DE-588)7636249-8 s Computersicherheit (DE-588)4274324-2 s DE-604 Erscheint auch als Online-Ausgabe urn:nbn:de:bvb:739-opus4-10026 https://opus4.kobv.de/opus4-uni-passau/frontdoor/index/index/docId/1002 kostenfrei Volltext https://nbn-resolving.de/urn:nbn:de:bvb:739-opus4-10026 Resolving-System kostenfrei Volltext Digitalisierung UB Passau - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032990714&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Alshawish, Ali ca. 20./21. Jh Risk-based security management in critical infrastructure organizations Spieltheorie (DE-588)4056243-8 gnd Kritische Infrastruktur (DE-588)7636249-8 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4056243-8 (DE-588)7636249-8 (DE-588)4274324-2 (DE-588)4113937-9 |
title | Risk-based security management in critical infrastructure organizations |
title_auth | Risk-based security management in critical infrastructure organizations |
title_exact_search | Risk-based security management in critical infrastructure organizations |
title_exact_search_txtP | Risk-based security management in critical infrastructure organizations |
title_full | Risk-based security management in critical infrastructure organizations Ali Alshawish |
title_fullStr | Risk-based security management in critical infrastructure organizations Ali Alshawish |
title_full_unstemmed | Risk-based security management in critical infrastructure organizations Ali Alshawish |
title_short | Risk-based security management in critical infrastructure organizations |
title_sort | risk based security management in critical infrastructure organizations |
topic | Spieltheorie (DE-588)4056243-8 gnd Kritische Infrastruktur (DE-588)7636249-8 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Spieltheorie Kritische Infrastruktur Computersicherheit Hochschulschrift |
url | https://opus4.kobv.de/opus4-uni-passau/frontdoor/index/index/docId/1002 https://nbn-resolving.de/urn:nbn:de:bvb:739-opus4-10026 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032990714&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT alshawishali riskbasedsecuritymanagementincriticalinfrastructureorganizations |