A risk analysis and risk management methodology for mitigating wireless local area networks (WLANs) intrusion security risks

Every environment is susceptible to risks and Wireless Local Area Networks (WLANs) based on the Institute of Electrical and Electronics Engineers (IEEE) 802.11 standard are no exception. The most apparent risk of WLANs is the ease with which itinerant intruders obtain illicit entry into these networ...

Full description

Bibliographic Details
Main Author: Abdullah, Hanifa
Other Authors: Eloff, Jan H.P.
Published: University of Pretoria 2013
Subjects:
Online Access:http://hdl.handle.net/2263/28649
Abdullah, H, 2006, A risk analysis and risk management methodology for mitigating wireless local area networks (WLANs) intrusion security risks , MSc(Computer Science) dissertation, University of Pretoria, Pretoria, viewed yymmdd < http://hdl.handle.net/2263/28649 >
http://upetd.up.ac.za/thesis/available/etd-10122006-155850/
id ndltd-netd.ac.za-oai-union.ndltd.org-up-oai-repository.up.ac.za-2263-28649
record_format oai_dc
spelling ndltd-netd.ac.za-oai-union.ndltd.org-up-oai-repository.up.ac.za-2263-286492020-06-02T03:18:05Z A risk analysis and risk management methodology for mitigating wireless local area networks (WLANs) intrusion security risks Abdullah, Hanifa Eloff, Jan H.P. abdulh@unisa.ac.za Ooda cycle Risk Risk analysis Risk management Octave Risk assessment Wireless intrusion detection system Wireless local area network (WLAN) UCTD Every environment is susceptible to risks and Wireless Local Area Networks (WLANs) based on the Institute of Electrical and Electronics Engineers (IEEE) 802.11 standard are no exception. The most apparent risk of WLANs is the ease with which itinerant intruders obtain illicit entry into these networks. These intrusion security risks must therefore be addressed which means that information security risk analysis and risk management need to be considered as integral elements of the organisation’s business plan. A well-established qualitative risk analysis and risk management methodology, the Operationally Critical Threat Asset and Vulnerability Evaluation (OCTAVE) is selected for conducting the WLAN intrusion security risk analysis and risk management process. However, the OCTAVE risk analysis methodology is beset with a number of problems that could hamper a successful WLAN intrusion security risk analysis. The ultimate deliverable of this qualitative risk analysis methodology is the creation of an organisation-wide protection strategy and risk mitigation plan. Achieving this end using the OCTAVE risk analysis methodology requires an inordinate amount of time, ranging from months to years. Since WLANs are persistently under attack, there is a dire need for an expeditious risk analysis methodology. Furthermore, the OCTAVE risk analysis methodology stipulates the identification of assets and corresponding threat scenarios via a brainstorming session, which may be beyond the scope of a person who is not proficient in information security issues. This research was therefore inspired by the pivotal need for a risk analysis and risk management methodology to address WLAN intrusion attacks and the resulting risks they pose to the confidentiality, integrity and availability of information processed by these networks. Copyright Dissertation (MSc (Computer Science))--University of Pretoria, 2006. Computer Science unrestricted 2013-09-07T13:59:38Z 2006-10-12 2013-09-07T13:59:38Z 2006-09-05 2006-10-12 2006-10-12 Dissertation http://hdl.handle.net/2263/28649 Abdullah, H, 2006, A risk analysis and risk management methodology for mitigating wireless local area networks (WLANs) intrusion security risks , MSc(Computer Science) dissertation, University of Pretoria, Pretoria, viewed yymmdd < http://hdl.handle.net/2263/28649 > E6/2006/gm http://upetd.up.ac.za/thesis/available/etd-10122006-155850/ © 2006, University of Pretoria. All rights reserved. The copyright in this work vests in the University of Pretoria. No part of this work may be reproduced or transmitted in any form or by any means, without the prior written permission of the University of Pretoria University of Pretoria
collection NDLTD
sources NDLTD
topic Ooda cycle
Risk
Risk analysis
Risk management
Octave
Risk assessment
Wireless intrusion detection system
Wireless local area network (WLAN)
UCTD
spellingShingle Ooda cycle
Risk
Risk analysis
Risk management
Octave
Risk assessment
Wireless intrusion detection system
Wireless local area network (WLAN)
UCTD
Abdullah, Hanifa
A risk analysis and risk management methodology for mitigating wireless local area networks (WLANs) intrusion security risks
description Every environment is susceptible to risks and Wireless Local Area Networks (WLANs) based on the Institute of Electrical and Electronics Engineers (IEEE) 802.11 standard are no exception. The most apparent risk of WLANs is the ease with which itinerant intruders obtain illicit entry into these networks. These intrusion security risks must therefore be addressed which means that information security risk analysis and risk management need to be considered as integral elements of the organisation’s business plan. A well-established qualitative risk analysis and risk management methodology, the Operationally Critical Threat Asset and Vulnerability Evaluation (OCTAVE) is selected for conducting the WLAN intrusion security risk analysis and risk management process. However, the OCTAVE risk analysis methodology is beset with a number of problems that could hamper a successful WLAN intrusion security risk analysis. The ultimate deliverable of this qualitative risk analysis methodology is the creation of an organisation-wide protection strategy and risk mitigation plan. Achieving this end using the OCTAVE risk analysis methodology requires an inordinate amount of time, ranging from months to years. Since WLANs are persistently under attack, there is a dire need for an expeditious risk analysis methodology. Furthermore, the OCTAVE risk analysis methodology stipulates the identification of assets and corresponding threat scenarios via a brainstorming session, which may be beyond the scope of a person who is not proficient in information security issues. This research was therefore inspired by the pivotal need for a risk analysis and risk management methodology to address WLAN intrusion attacks and the resulting risks they pose to the confidentiality, integrity and availability of information processed by these networks. Copyright === Dissertation (MSc (Computer Science))--University of Pretoria, 2006. === Computer Science === unrestricted
author2 Eloff, Jan H.P.
author_facet Eloff, Jan H.P.
Abdullah, Hanifa
author Abdullah, Hanifa
author_sort Abdullah, Hanifa
title A risk analysis and risk management methodology for mitigating wireless local area networks (WLANs) intrusion security risks
title_short A risk analysis and risk management methodology for mitigating wireless local area networks (WLANs) intrusion security risks
title_full A risk analysis and risk management methodology for mitigating wireless local area networks (WLANs) intrusion security risks
title_fullStr A risk analysis and risk management methodology for mitigating wireless local area networks (WLANs) intrusion security risks
title_full_unstemmed A risk analysis and risk management methodology for mitigating wireless local area networks (WLANs) intrusion security risks
title_sort risk analysis and risk management methodology for mitigating wireless local area networks (wlans) intrusion security risks
publisher University of Pretoria
publishDate 2013
url http://hdl.handle.net/2263/28649
Abdullah, H, 2006, A risk analysis and risk management methodology for mitigating wireless local area networks (WLANs) intrusion security risks , MSc(Computer Science) dissertation, University of Pretoria, Pretoria, viewed yymmdd < http://hdl.handle.net/2263/28649 >
http://upetd.up.ac.za/thesis/available/etd-10122006-155850/
work_keys_str_mv AT abdullahhanifa ariskanalysisandriskmanagementmethodologyformitigatingwirelesslocalareanetworkswlansintrusionsecurityrisks
AT abdullahhanifa riskanalysisandriskmanagementmethodologyformitigatingwirelesslocalareanetworkswlansintrusionsecurityrisks
_version_ 1719316121680609280