A risk analysis and risk management methodology for mitigating wireless local area networks (WLANs) intrusion security risks
Every environment is susceptible to risks and Wireless Local Area Networks (WLANs) based on the Institute of Electrical and Electronics Engineers (IEEE) 802.11 standard are no exception. The most apparent risk of WLANs is the ease with which itinerant intruders obtain illicit entry into these networ...
id |
ndltd-netd.ac.za-oai-union.ndltd.org-up-oai-repository.up.ac.za-2263-28649 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-netd.ac.za-oai-union.ndltd.org-up-oai-repository.up.ac.za-2263-286492020-06-02T03:18:05Z A risk analysis and risk management methodology for mitigating wireless local area networks (WLANs) intrusion security risks Abdullah, Hanifa Eloff, Jan H.P. abdulh@unisa.ac.za Ooda cycle Risk Risk analysis Risk management Octave Risk assessment Wireless intrusion detection system Wireless local area network (WLAN) UCTD Every environment is susceptible to risks and Wireless Local Area Networks (WLANs) based on the Institute of Electrical and Electronics Engineers (IEEE) 802.11 standard are no exception. The most apparent risk of WLANs is the ease with which itinerant intruders obtain illicit entry into these networks. These intrusion security risks must therefore be addressed which means that information security risk analysis and risk management need to be considered as integral elements of the organisation’s business plan. A well-established qualitative risk analysis and risk management methodology, the Operationally Critical Threat Asset and Vulnerability Evaluation (OCTAVE) is selected for conducting the WLAN intrusion security risk analysis and risk management process. However, the OCTAVE risk analysis methodology is beset with a number of problems that could hamper a successful WLAN intrusion security risk analysis. The ultimate deliverable of this qualitative risk analysis methodology is the creation of an organisation-wide protection strategy and risk mitigation plan. Achieving this end using the OCTAVE risk analysis methodology requires an inordinate amount of time, ranging from months to years. Since WLANs are persistently under attack, there is a dire need for an expeditious risk analysis methodology. Furthermore, the OCTAVE risk analysis methodology stipulates the identification of assets and corresponding threat scenarios via a brainstorming session, which may be beyond the scope of a person who is not proficient in information security issues. This research was therefore inspired by the pivotal need for a risk analysis and risk management methodology to address WLAN intrusion attacks and the resulting risks they pose to the confidentiality, integrity and availability of information processed by these networks. Copyright Dissertation (MSc (Computer Science))--University of Pretoria, 2006. Computer Science unrestricted 2013-09-07T13:59:38Z 2006-10-12 2013-09-07T13:59:38Z 2006-09-05 2006-10-12 2006-10-12 Dissertation http://hdl.handle.net/2263/28649 Abdullah, H, 2006, A risk analysis and risk management methodology for mitigating wireless local area networks (WLANs) intrusion security risks , MSc(Computer Science) dissertation, University of Pretoria, Pretoria, viewed yymmdd < http://hdl.handle.net/2263/28649 > E6/2006/gm http://upetd.up.ac.za/thesis/available/etd-10122006-155850/ © 2006, University of Pretoria. All rights reserved. The copyright in this work vests in the University of Pretoria. No part of this work may be reproduced or transmitted in any form or by any means, without the prior written permission of the University of Pretoria University of Pretoria |
collection |
NDLTD |
sources |
NDLTD |
topic |
Ooda cycle Risk Risk analysis Risk management Octave Risk assessment Wireless intrusion detection system Wireless local area network (WLAN) UCTD |
spellingShingle |
Ooda cycle Risk Risk analysis Risk management Octave Risk assessment Wireless intrusion detection system Wireless local area network (WLAN) UCTD Abdullah, Hanifa A risk analysis and risk management methodology for mitigating wireless local area networks (WLANs) intrusion security risks |
description |
Every environment is susceptible to risks and Wireless Local Area Networks (WLANs) based on the Institute of Electrical and Electronics Engineers (IEEE) 802.11 standard are no exception. The most apparent risk of WLANs is the ease with which itinerant intruders obtain illicit entry into these networks. These intrusion security risks must therefore be addressed which means that information security risk analysis and risk management need to be considered as integral elements of the organisation’s business plan. A well-established qualitative risk analysis and risk management methodology, the Operationally Critical Threat Asset and Vulnerability Evaluation (OCTAVE) is selected for conducting the WLAN intrusion security risk analysis and risk management process. However, the OCTAVE risk analysis methodology is beset with a number of problems that could hamper a successful WLAN intrusion security risk analysis. The ultimate deliverable of this qualitative risk analysis methodology is the creation of an organisation-wide protection strategy and risk mitigation plan. Achieving this end using the OCTAVE risk analysis methodology requires an inordinate amount of time, ranging from months to years. Since WLANs are persistently under attack, there is a dire need for an expeditious risk analysis methodology. Furthermore, the OCTAVE risk analysis methodology stipulates the identification of assets and corresponding threat scenarios via a brainstorming session, which may be beyond the scope of a person who is not proficient in information security issues. This research was therefore inspired by the pivotal need for a risk analysis and risk management methodology to address WLAN intrusion attacks and the resulting risks they pose to the confidentiality, integrity and availability of information processed by these networks. Copyright === Dissertation (MSc (Computer Science))--University of Pretoria, 2006. === Computer Science === unrestricted |
author2 |
Eloff, Jan H.P. |
author_facet |
Eloff, Jan H.P. Abdullah, Hanifa |
author |
Abdullah, Hanifa |
author_sort |
Abdullah, Hanifa |
title |
A risk analysis and risk management methodology for mitigating wireless local area networks (WLANs) intrusion security risks |
title_short |
A risk analysis and risk management methodology for mitigating wireless local area networks (WLANs) intrusion security risks |
title_full |
A risk analysis and risk management methodology for mitigating wireless local area networks (WLANs) intrusion security risks |
title_fullStr |
A risk analysis and risk management methodology for mitigating wireless local area networks (WLANs) intrusion security risks |
title_full_unstemmed |
A risk analysis and risk management methodology for mitigating wireless local area networks (WLANs) intrusion security risks |
title_sort |
risk analysis and risk management methodology for mitigating wireless local area networks (wlans) intrusion security risks |
publisher |
University of Pretoria |
publishDate |
2013 |
url |
http://hdl.handle.net/2263/28649 Abdullah, H, 2006, A risk analysis and risk management methodology for mitigating wireless local area networks (WLANs) intrusion security risks , MSc(Computer Science) dissertation, University of Pretoria, Pretoria, viewed yymmdd < http://hdl.handle.net/2263/28649 > http://upetd.up.ac.za/thesis/available/etd-10122006-155850/ |
work_keys_str_mv |
AT abdullahhanifa ariskanalysisandriskmanagementmethodologyformitigatingwirelesslocalareanetworkswlansintrusionsecurityrisks AT abdullahhanifa riskanalysisandriskmanagementmethodologyformitigatingwirelesslocalareanetworkswlansintrusionsecurityrisks |
_version_ |
1719316121680609280 |