Publication
Aug 2000
This paper examines the degree of security required to counter computer-related risks. After discussing the deficiencies of the first and second generation approaches of computer security risk models, the author proposes a candidate modeling approach that explicitly incorporates uncertainty and allows for varying degrees of modeling detail to address the failings of previous modeling paradigms. He also presents a critique of publicly available computer security tools and concludes with a case study example.
Download |
English (PDF, 99 pages, 545 KB) |
---|---|
Author | Kevin J Soo Hoo |
Series | CISAC Working Papers |
Publisher | Center for International Security and Cooperation (CISAC) |
Copyright | © 2000 Center for International Security and Cooperation (CISAC) |