首页> 外文期刊>Journal of Information Security >Reducing Threats by Using Bayesian Networks to Prioritize and Combine Defense in Depth Security Measures
【24h】

Reducing Threats by Using Bayesian Networks to Prioritize and Combine Defense in Depth Security Measures

机译:通过使用贝叶斯网络优先考虑并结合深度安全措施来减少威胁

获取原文
       

摘要

Studied in this article is whether the Bayesian Network Model (BNM) can be effectively applied to the prioritization of defense in-depth security tools and procedures and to the combining of those measures to reduce cyber threats. The methods used in this study consisted of scanning 24 peer reviewed Cybersecurity Articles from prominent Cybersecurity Journals using the Likert Scale Model for the article’s list of defense in depth measures (tools and procedures) and the threats that those measures were designed to reduce. The defense in depth tools and procedures are then compared to see whether the Likert scale and the Bayesian Network Model could be effectively applied to prioritize and combine the measures to reduce cyber threats attacks against organizational and private computing systems. The findings of the research reject the H0 null hypothesis that BNM does not affect the relationship between the prioritization and combining of 24 Cybersecurity Article’s defense in depth tools and procedures (independent variables) and cyber threats (dependent variables).
机译:本文研究的是贝叶斯网络模型(BNM)是否可以有效地应用于防御深度安全工具和程序的优先级,并结合这些措施来减少网络威胁。本研究中使用的方法包括扫描24个同行,从突出的网络安全期刊使用李克特规模模型,为文章的防守列表(工具和程序)以及这些措施旨在减少的威胁来审查。然后比较深度工具和程序的防御,看看李克特量表和贝叶斯网络模型是否可以有效地应用于优先级,并结合减少网络威胁对组织和私有计算系统的攻击的措施。研究结果拒绝了H0 NULL假设,即BNM不会影响24个网络安全文章在深度工具和程序(独立变量)和网络威胁(依赖变量)之间的防御之间的关系。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号