Computer vulnerability risk analysis.
The discussions presented in this dissertation have been undertaken in answer to the need for securing the intellectual assets stored on computer systems. Computer vulnerabilities and their influence on computer systems and the intellectual assets they possess are the main focus of this research. In...
Main Author: | |
---|---|
Published: |
2008
|
Subjects: | |
Online Access: | http://hdl.handle.net/10210/517 |
id |
ndltd-netd.ac.za-oai-union.ndltd.org-uj-uj-8801 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-netd.ac.za-oai-union.ndltd.org-uj-uj-88012017-09-16T04:01:11ZComputer vulnerability risk analysis.Van Loggerenberg, Mornecomputer securitycomputer systems' risk assessmentThe discussions presented in this dissertation have been undertaken in answer to the need for securing the intellectual assets stored on computer systems. Computer vulnerabilities and their influence on computer systems and the intellectual assets they possess are the main focus of this research. In an effort to portray the influence of vulnerabilities on a computer system, a method for assigning a measure of risk to individual vulnerabilities is proposed. This measure of risk, in turn, gives rise to the development of the vulnerability risk status of a computer system. In short, vulnerability risk status is the total measure of risk a computer system is exposed to according to its vulnerabilities, at a certain point in time. A prototype was developed to create the vulnerability risk status of a computer system, which summarizes the purpose of the research in this dissertation. The discussions start with background information concerning the influence of the inherent vulnerabilities on computer systems. A conceptual model is proposed for achieving the creation of the vulnerability risk status of a computer system. Later chapters are concerned with categorizing all known vulnerabilities so that the main areas of vulnerability within a computer system can be identified. Different security technologies and tools are also evaluated to determine those that could aid the creation of vulnerability risk status. A security tool is selected and the generic, architectural elements are manipulated to allow the added functionality of vulnerability risk status. In conclusion, discussions are evaluated to determine whether the problem statements have been addressed and thoroughly resolved.Eloff, J.H.P., Prof.2008-06-04T09:26:54ZThesisuj:8801http://hdl.handle.net/10210/517 |
collection |
NDLTD |
sources |
NDLTD |
topic |
computer security computer systems' risk assessment |
spellingShingle |
computer security computer systems' risk assessment Van Loggerenberg, Morne Computer vulnerability risk analysis. |
description |
The discussions presented in this dissertation have been undertaken in answer to the need for securing the intellectual assets stored on computer systems. Computer vulnerabilities and their influence on computer systems and the intellectual assets they possess are the main focus of this research. In an effort to portray the influence of vulnerabilities on a computer system, a method for assigning a measure of risk to individual vulnerabilities is proposed. This measure of risk, in turn, gives rise to the development of the vulnerability risk status of a computer system. In short, vulnerability risk status is the total measure of risk a computer system is exposed to according to its vulnerabilities, at a certain point in time. A prototype was developed to create the vulnerability risk status of a computer system, which summarizes the purpose of the research in this dissertation. The discussions start with background information concerning the influence of the inherent vulnerabilities on computer systems. A conceptual model is proposed for achieving the creation of the vulnerability risk status of a computer system. Later chapters are concerned with categorizing all known vulnerabilities so that the main areas of vulnerability within a computer system can be identified. Different security technologies and tools are also evaluated to determine those that could aid the creation of vulnerability risk status. A security tool is selected and the generic, architectural elements are manipulated to allow the added functionality of vulnerability risk status. In conclusion, discussions are evaluated to determine whether the problem statements have been addressed and thoroughly resolved. === Eloff, J.H.P., Prof. |
author |
Van Loggerenberg, Morne |
author_facet |
Van Loggerenberg, Morne |
author_sort |
Van Loggerenberg, Morne |
title |
Computer vulnerability risk analysis. |
title_short |
Computer vulnerability risk analysis. |
title_full |
Computer vulnerability risk analysis. |
title_fullStr |
Computer vulnerability risk analysis. |
title_full_unstemmed |
Computer vulnerability risk analysis. |
title_sort |
computer vulnerability risk analysis. |
publishDate |
2008 |
url |
http://hdl.handle.net/10210/517 |
work_keys_str_mv |
AT vanloggerenbergmorne computervulnerabilityriskanalysis |
_version_ |
1718535052183207936 |