Vulnerability-threats assessment for enterprise network
The information security management system is to provide clear guideline for risk evaluation and assessment for enterprise networks. The risk evaluation is based on the relationships among the most critical assets, and threats that are likely to those assets and the vulnerability impacts. Threat and...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Published: |
2013
|
Subjects: | |
Online Access: | http://eprints.utm.my/id/eprint/40832/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Teknologi Malaysia |
Summary: | The information security management system is to provide clear guideline for risk evaluation and assessment for enterprise networks. The risk evaluation is based on the relationships among the most critical assets, and threats that are likely to those assets and the vulnerability impacts. Threat and risk assessment are conducted to identify the safeguards to be adapted to maintain confidentiality. In this paper, we provide the network security integrity strategy by identifying the areas of greatest risk and concentrate on those triggers like Trojan horses, viruses, and malwares. These factors can degrade network system performance through disclosure of sensitive information and denial of service that result in economic losses. With a look at the risk evaluation, assessment, and factors of return on investment as a whole on the enterprise network infrastructure. |
---|