Academic literature on the topic 'Information security toolkit'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Information security toolkit.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Information security toolkit"

1

Calix, Ricardo A., Sumendra B. Singh, Tingyu Chen, Dingkai Zhang, and Michael Tu. "Cyber Security Tool Kit (CyberSecTK): A Python Library for Machine Learning and Cyber Security." Information 11, no. 2 (February 11, 2020): 100. http://dx.doi.org/10.3390/info11020100.

Full text
Abstract:
The cyber security toolkit, CyberSecTK, is a simple Python library for preprocessing and feature extraction of cyber-security-related data. As the digital universe expands, more and more data need to be processed using automated approaches. In recent years, cyber security professionals have seen opportunities to use machine learning approaches to help process and analyze their data. The challenge is that cyber security experts do not have necessary trainings to apply machine learning to their problems. The goal of this library is to help bridge this gap. In particular, we propose the development of a toolkit in Python that can process the most common types of cyber security data. This will help cyber experts to implement a basic machine learning pipeline from beginning to end. This proposed research work is our first attempt to achieve this goal. The proposed toolkit is a suite of program modules, data sets, and tutorials supporting research and teaching in cyber security and defense. An example of use cases is presented and discussed. Survey results of students using some of the modules in the library are also presented.
APA, Harvard, Vancouver, ISO, and other styles
2

Macy, Jason. "Product vs toolkit: API and IAM security." Network Security 2019, no. 6 (June 2019): 13–15. http://dx.doi.org/10.1016/s1353-4858(19)30073-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Masloboev, A. V. "A multi-agent technology for network-centric control information support of regional security." Informacionno-technologicheskij vestnik, no. 2 (July 30, 2018): 92–102. http://dx.doi.org/10.21499/2409-1650-2018-2-92-102.

Full text
Abstract:
The article represents research and work-out results in the field of applied agent-based decision support system development for regional security management. General problem statement of the regional security management information support is carried out. Modeling and automation tools of security manager activities within the region safeguarding process, interacting in the unified information environment, are proposed. A multi-agent technology for network-centric control information support of regional security has been developed. The technology is based on agent-oriented and system dynamics methodologies integration and use hybrid smart agents with integrated simulation toolkit.
APA, Harvard, Vancouver, ISO, and other styles
4

Klychova, Guzaliya, Alsu Zakirova, Angelina Dyatlova, Augul Klychova, and Nailya Zalyalova. "METHODOLOGICAL TOOLKIT FOR ENSURING ECONOMIC SECURITY IN THE PERSONNEL MANAGEMENT SYSTEM." Vestnik of Kazan State Agrarian University 15, no. 3 (November 30, 2020): 107–13. http://dx.doi.org/10.12737/2073-0462-2020-107-113.

Full text
Abstract:
The economic security system is a set of structures or services, the continuous activity of which is aimed at increasing security from external and internal threats and ensuring effective enterprise management. Each enterprise should develop its own system that ensures economic security and takes into account the specifics, organizational structure and scale of financial and economic activities of an economic entity. The purpose of the study is to develop recommendations for improving the methodological tools for ensuring economic security in the personnel management system. The proposed tests for assessing the heads of structural divisions and assessing the personnel management system of the enterprise allow us to evaluate each individual employee and the effectiveness of the personnel management system as a whole. In particular, when selecting heads of structural divisions, it is advisable to take into account such factors as advanced training, the presence of chronic diseases, convictions and administrative offenses, arrears on rent and loans, knowledge of foreign languages, the level of use of a personal computer, etc. On the effectiveness of the personnel management system as a whole the readiness of employees for additional vocational training or advanced training affects; provision of reliable, timely, confidential and accurate information by the internal control system; availability of control of automated information systems and program control of financial and business operations; observance of the official instructions by the personnel; the presence of internal regulatory documents on the protection of personal data and the procedure for managing information activities, as well as a separate economic security service, etc. By analyzing the answers to the questions contained in the tests, it is possible to give a generalized assessment of economic security in the personnel management system, as well as to develop further measures on its increase, including the selection of potential applicants for a certain position
APA, Harvard, Vancouver, ISO, and other styles
5

Masloboev, A. V. "Software system «Network-centric managerial structures synthesizer»." Informacionno-technologicheskij vestnik 14, no. 4 (December 30, 2017): 145–55. http://dx.doi.org/10.21499/2409-1650-2017-4-145-155.

Full text
Abstract:
For practical applications and problem-solving of regional security management information support on the basis of combined simulation-expert modeling a special-purpose software system «Network-centric managerial structures synthesizer» has been developed. Software system provides agent-based model automated synthesis and analysis of the networked virtual managerial structures for security support under crisis situations in socio-economic sphere of regional development. System simulation and software toolkit allows alternative modeling scenario spectrum formation, analysis and extension of regional crisis situations. That provides managerial decision-making information probability and validity in the field of regional security support.
APA, Harvard, Vancouver, ISO, and other styles
6

Werner, J., Y. Lee, B. Malin, A. Ledeczi, and J. Mathe. "Model-based Design of Clinical Information Systems." Methods of Information in Medicine 47, no. 05 (2008): 399–408. http://dx.doi.org/10.3414/me9121.

Full text
Abstract:
Summary Objective: The goal of this research is to provide a framework to enable the model-based development, simulation, and deployment of clinical information system prototypes with mechanisms that enforce security and privacy policies. Methods: We developed the Model-Integrated Clinical Information System (MICIS), a software toolkit that is based on model-based design techniques and highlevel modeling abstractions to represent complex clinical workflows in a service-oriented architecture paradigm. MICIS translates models into executable constructs, such as web service descriptions, business process execution language procedures, and deployment instructions. MICIS models are enriched with formal security and privacy specifications, which are enforced within the execution environment. Results: We successfully validated our design platform by modeling multiple clinical workflows and deploying them onto the execution platform. Conclusions: The model-based approach shows great promise for developing, simulating, and evolving clinical information systems with formal properties and policy restrictions.
APA, Harvard, Vancouver, ISO, and other styles
7

Zatonatskiy, D. "Diagnostics of Insider Risks and Threats in Personnel Security Management of the Enterprise." Bulletin of Taras Shevchenko National University of Kyiv. Economics, no. 204 (2019): 20–27. http://dx.doi.org/10.17721/1728-2667.2019/204-3/3.

Full text
Abstract:
For the Ukrainian enterprises it is most expedient to use the Bayesian model because it is simple in implementation, allows for the individuality of each employee’s activity and does not have ethical and legal constraints. Recommendations for introducing comprehensive and integrated personnel security systems for domestic enterprises to improve the practice of psychological diagnostics and monitoring of employee’s actions are given, in particular, improvement of systems for collecting information about employees’ behavioral indicators in the corporate environment and beyond. The necessity of using modern toolkit for diagnosing risks and threats, for instance, OCEAN and CHAMPION systems, is proved, that significantly improves personnel security management in the systems of economic safety of enterprises. It has been determined that according to the criterion of the expenditure, an effective toolkit for identifying insider risks and threats can be a model based on data on social and interactive activities of enterprise employees.
APA, Harvard, Vancouver, ISO, and other styles
8

Jaïdi, Faouzi, Faten Labbene Ayachi, and Adel Bouhoula. "A Methodology and Toolkit for Deploying Reliable Security Policies in Critical Infrastructures." Security and Communication Networks 2018 (2018): 1–22. http://dx.doi.org/10.1155/2018/7142170.

Full text
Abstract:
Substantial advances in Information and Communication Technologies (ICT) bring out novel concepts, solutions, trends, and challenges to integrate intelligent and autonomous systems in critical infrastructures. A new generation of ICT environments (such as smart cities, Internet of Things,edge-fog-social-cloudcomputing, and big data analytics) is emerging; it has different applications to critical domains (such as transportation, communication, finance, commerce, and healthcare) and different interconnections via multiple layers of public and private networks, forming a grid of critical cyberphysical infrastructures. Protecting sensitive and private data and services in critical infrastructures is, at the same time, a main objective and a great challenge for deploying secure systems. It essentially requires setting up trusted security policies. Unfortunately, security solutions should remain compliant and regularly updated to follow and track the evolution of security threats. To address this issue, we propose an advanced methodology for deploying and monitoring the compliance of trusted access control policies. Our proposal extends the traditional life cycle of access control policies with pertinent activities. It integrates formal and semiformal techniques allowing the specification, the verification, the implementation, the reverse-engineering, the validation, the risk assessment, and the optimization of access control policies. To automate and facilitate the practice of our methodology, we introduce our systemSVIRVROthat allows managing the extended life cycle of access control policies. We refer to an illustrative example to highlight the relevance of our contributions.
APA, Harvard, Vancouver, ISO, and other styles
9

Gonzalez-Granadillo, Gustavo, Sofia Anna Menesidou, Dimitrios Papamartzivanos, Ramon Romeu, Diana Navarro-Llobet, Caxton Okoh, Sokratis Nifakos, Christos Xenakis, and Emmanouil Panaousis. "Automated Cyber and Privacy Risk Management Toolkit." Sensors 21, no. 16 (August 15, 2021): 5493. http://dx.doi.org/10.3390/s21165493.

Full text
Abstract:
Addressing cyber and privacy risks has never been more critical for organisations. While a number of risk assessment methodologies and software tools are available, it is most often the case that one must, at least, integrate them into a holistic approach that combines several appropriate risk sources as input to risk mitigation tools. In addition, cyber risk assessment primarily investigates cyber risks as the consequence of vulnerabilities and threats that threaten assets of the investigated infrastructure. In fact, cyber risk assessment is decoupled from privacy impact assessment, which aims to detect privacy-specific threats and assess the degree of compliance with data protection legislation. Furthermore, a Privacy Impact Assessment (PIA) is conducted in a proactive manner during the design phase of a system, combining processing activities and their inter-dependencies with assets, vulnerabilities, real-time threats and Personally Identifiable Information (PII) that may occur during the dynamic life-cycle of systems. In this paper, we propose a cyber and privacy risk management toolkit, called AMBIENT (Automated Cyber and Privacy Risk Management Toolkit) that addresses the above challenges by implementing and integrating three distinct software tools. AMBIENT not only assesses cyber and privacy risks in a thorough and automated manner but it also offers decision-support capabilities, to recommend optimal safeguards using the well-known repository of the Center for Internet Security (CIS) Controls. To the best of our knowledge, AMBIENT is the first toolkit in the academic literature that brings together the aforementioned capabilities. To demonstrate its use, we have created a case scenario based on information about cyber attacks we have received from a healthcare organisation, as a reference sector that faces critical cyber and privacy threats.
APA, Harvard, Vancouver, ISO, and other styles
10

Natsiavas, Pantelis, Giovanni Mazzeo, Giuliana Faiella, Paolo Campegiani, Jos Dumortier, Oana Stan, Marco Nalin, et al. "Developing an infrastructure for secure patient summary exchange in the EU context: Lessons learned from the KONFIDO project." Health Informatics Journal 27, no. 2 (April 2021): 146045822110214. http://dx.doi.org/10.1177/14604582211021459.

Full text
Abstract:
Background: The increase of healthcare digitalization comes along with potential information security risks. Thus, the EU H2020 KONFIDO project aimed to provide a toolkit supporting secure cross-border health data exchange. Methods: KONFIDO focused on the so-called “User Goals”, while also identifying barriers and facilitators regarding eHealth acceptance. Key user scenarios were elaborated both in terms of threat analysis and legal challenges. Moreover, KONFIDO developed a toolkit aiming to enhance the security of OpenNCP, the reference implementation framework. Results: The main project outcomes are highlighted and the “Lessons Learned,” the technical challenges and the EU context are detailed. Conclusions: The main “Lessons Learned” are summarized and a set of recommendations is provided, presenting the position of the KONFIDO consortium toward a robust EU-wide health data exchange infrastructure. To this end, the lack of infrastructure and technical capacity is highlighted, legal and policy challenges are identified and the need to focus on usability and semantic interoperability is emphasized. Regarding technical issues, an emphasis on transparent and standards-based development processes is recommended, especially for landmark software projects. Finally, promoting mentality change and knowledge dissemination is also identified as key step toward the development of secure cross-border health data exchange services.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Information security toolkit"

1

Korovessis, Peter. "Establishing an information security awareness and culture." Thesis, University of Plymouth, 2015. http://hdl.handle.net/10026.1/3836.

Full text
Abstract:
In today’s business environment all business operations are enabled by technology. Its always on and connected nature has brought new business possibilities but at the same time has increased the number of potential threats. Information security has become an established discipline as more and more businesses realize its value. Many surveys have indicated the importance of protecting valuable information and an important aspect that must be addressed in this regard is information security awareness. The human component has been recognized to have an important role in information security since the only way to reduce security risks is through making employees more information security aware. This also means that employees take responsibility of their actions when dealing with information in their everyday activities. The research is concentrated mainly on information security concepts alongside their relation to the human factor with evidence that users remain susceptible to information security threats, thus illustrating the need for more effective user training in order to raise the level of security awareness. Two surveys were undertaken in order to investigate the potential of raising security awareness within existing education systems by measuring the level of security awareness amongst the online population. The surveys analyzed not only the awareness levels and needs of students during their study and their preparation towards entering the workforce, but also whether this awareness level changes as they progress in their studies. The results of both surveys established that the awareness level of students concerning information security concepts is not at a sufficient level for students entering university education and does not significantly change as they progress their academic life towards entering the workforce. In respect to this, the research proposes and develops the information security toolkit as a prototype awareness raising initiative. The research goes one step further by piloting and evaluating toolkit effectiveness. As an awareness raising method, the toolkit will be the basis for the general technology user to understand the challenges associated with secure use of information technology and help him assess its current knowledge, identify lacks and weaknesses and acquire the required knowledge in order to be competent and confident users of technology.
APA, Harvard, Vancouver, ISO, and other styles
2

(8800973), Kelsey Billups. "New and Emerging Mobile Apps Among Teens - Are Forensic Tools Keeping Up?" Thesis, 2020.

Find full text
Abstract:
Mobile applications are an important but fast changing piece of the digital forensics’ world. For mobile forensics researchers and field analysts, it is hard to keep up with the pace of the ever-changing world of the newest and most popular applications teens are using. Mobile forensic tools are quickly becoming more and more supportive of new applications, but with how quickly apps are changing and new ones being released, it is still difficult for the tools to keep up. The research question for this project examines to what extent digital forensic tools support new and emerging applications seen recently in investigations involving teenagers? For this research, a survey was conducted asking digital forensic analysts, and others who investigate digital crimes, what applications they are coming across most frequently during investigations involving teens and whether those applications are being supported by forensic tools. The top three applications from the survey that were not supported by mobile forensic tools, Monkey, Houseparty, and Likee were populated onto a test device and then evaluated and analyzed to see what forensic artifacts were found in those applications. The mobile application artifacts were then compared on two different forensic tools to see which tool obtains the most forensic artifacts from the applications. Through the examination and analysis of the applications and data contained within the apps, it was determined that 61% of the populated forensic artifacts were recovered manually and only 45% were recovered by a forensic tool for the Monkey application. 100% of the populated forensic artifacts were recovered manually and only 29% were recovered by a forensic tool for the Houseparty application. 42% of the populated forensic artifacts were recovered manually and only 3% were recovered by a forensic tool for the Likee application. It was found that the extent of support from digital forensic tools for these types of applications depends greatly on how the application stores the artifacts, but the artifact extraction support was limited for all applications. This research benefits in helping researchers and analysts by understanding the data and artifacts contained within the applications, what forensic artifacts are recoverable, and where to find those important artifacts. This research can help in finding important evidence for future investigations.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Information security toolkit"

1

Chris, Goggans, ed. The complete Internet business toolkit. New York: Van Nostrand Reinhold, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Schwartau, Winn. The complete Internet business toolkit. New York: John Wiley & Sons, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Blokdijk, Gerard. IT risk management guide: Risk management implementation guide, presentations, blueprints, templates : complete risk management toolkit guide for information technology processes and systems. Brisbane, Australia: Art of Service, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Information Security Risk Assessment Toolkit. Elsevier, 2013. http://dx.doi.org/10.1016/c2010-0-69579-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Cohen, Fred. The Chief Information Security Officer's Toolkit: Security Program Metrics. Fred Cohen & Associates, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Cohen, Fred. The Chief Information Security Officer's Toolkit: Governance Guidebook. Fred Cohen & Associates, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Information Security Risk Assessment Toolkit Practical Assessments Through Data Collection And Data Analysis. Syngress Publishing, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Martin, Keith M. Closing Remarks. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0015.

Full text
Abstract:
We have now completed our introduction to everyday cryptography. We have seen that cryptography is essentially a toolkit of mathematical techniques for implementing the core security services required to protect information. We have learnt many important lessons about cryptography along the way. In particular:Cryptography is much more than encryption...
APA, Harvard, Vancouver, ISO, and other styles
9

GOVERNMENT, US. 21st Century Comprehensive Terrorism Survival Information Toolkit: Featuring U.S. Military Antiterrorism Personal Protection Guide, Self-Help Guide to Antiterrorism, with Additional Emergency Terrorism Plans from FEMA and the Department of Homeland Security ¿ Nuclear, Biological, Chemical Attack Threats, Shelter in Place Options. Progressive Management, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Information security toolkit"

1

Pirocca, Simone, Luca Allodi, and Nicola Zannone. "A Toolkit for Security Awareness Training Against Targeted Phishing." In Information Systems Security, 137–59. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-65610-2_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Davidson, Alex, and Carlos Cid. "An Efficient Toolkit for Computing Private Set Operations." In Information Security and Privacy, 261–78. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-59870-3_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Coopamootoo, Kovila P. L., and Thomas Groß. "Cyber Security and Privacy Experiments: A Design and Reporting Toolkit." In IFIP Advances in Information and Communication Technology, 243–62. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-92925-5_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bogdanov, Dan, Roman Jagomägis, and Sven Laur. "A Universal Toolkit for Cryptographically Secure Privacy-Preserving Data Mining." In Intelligence and Security Informatics, 112–26. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-30428-6_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Keyser, Tobias. "Security policy." In The Information Governance Toolkit, 57–62. CRC Press, 2018. http://dx.doi.org/10.1201/9781315385488-13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Keyser, Tobias. "Security responsibilities." In The Information Governance Toolkit, 63–64. CRC Press, 2018. http://dx.doi.org/10.1201/9781315385488-14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Keyser, Tobias. "Security incidents." In The Information Governance Toolkit, 69–72. CRC Press, 2018. http://dx.doi.org/10.1201/9781315385488-16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Keyser, Tobias. "Security Monitoring." In The Information Governance Toolkit, 73–75. CRC Press, 2018. http://dx.doi.org/10.1201/9781315385488-17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Keyser, Tobias. "Confidentiality and security training needs." In The Information Governance Toolkit, 24–25. CRC Press, 2018. http://dx.doi.org/10.1201/9781315385488-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

R., Aarthee, and Ezhilmaran D. "Cyber Crime Toolkit Development." In Handbook of Research on Network Forensics and Analysis Techniques, 184–224. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-4100-4.ch011.

Full text
Abstract:
This chapter describes how cybercrime, likewise called computer crime, is any illicit activity that includes a PC or system associated gadget. While numerous magnificent items have been produced to secure our information correspondence frameworks, these items must be upgraded significantly more. What is additionally required more are the individuals who know how to explore PC network security episodes and the individuals who have both investigative gifts and specialized knowledge of how the internet truly functions. This allows for an investigative structure which can withstand attack, alongside information of how the internet functions and the instruments to examine cybercrime apparatus to tell the who, where, what, when, why, and how. Cybercrime apparatus make our work substantially more productive.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Information security toolkit"

1

McLendon, William C., Timothy M. Shead, Andrew Wilson, Brian Wylie, and Jeffrey Baumes. "Network algorithms for information analysis using the Titan Toolkit." In 2010 IEEE International Carnahan Conference on Security Technology (ICCST). IEEE, 2010. http://dx.doi.org/10.1109/ccst.2010.5678695.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Accorsi, Rafael, Claus Wonnemann, and Sebastian Dochow. "SWAT: A Security Workflow Analysis Toolkit for Reliably Secure Process-aware Information Systems." In 2011 Sixth International Conference on Availability, Reliability and Security (ARES). IEEE, 2011. http://dx.doi.org/10.1109/ares.2011.108.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Huynen, Jean-Louis, and Gabriele Lenzini. "From Situation Awareness to Action: An Information Security Management Toolkit for Socio-technical Security Retrospective and Prospective Analysis." In 3rd International Conference on Information Systems Security and Privacy. SCITEPRESS - Science and Technology Publications, 2017. http://dx.doi.org/10.5220/0006211302130224.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wang, Tian, Hui Xu, Yi Zhu, Jieqing Ai, and Wubing Zhou. "Implementation and Design of Security Configuration Check Toolkit for Classified Evaluation of Information System." In 2012 National Conference on Information Technology and Computer Science. Paris, France: Atlantis Press, 2012. http://dx.doi.org/10.2991/citcs.2012.114.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

El Kafrawy, Passent M., Amr M. Sauber, Mohamed M. Hafez, and Amr F. Shawish. "HDFSx: An Enhanced Model to Handle Small Files in Hadoop with a Simulating Toolkit." In 2018 1st International Conference on Computer Applications & Information Security (ICCAIS). IEEE, 2018. http://dx.doi.org/10.1109/cais.2018.8442036.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Chapman, Robert E., Jeffrey T. Fong, David T. Butry, Douglas S. Thomas, James J. Filliben, and N. Alan Heckert. "An Economics-Based Intelligence (EI) Tool for Pressure Vessel and Piping (PVP) Failure Consequence Estimation." In ASME 2010 Pressure Vessels and Piping Division/K-PVP Conference. ASMEDC, 2010. http://dx.doi.org/10.1115/pvp2010-25226.

Full text
Abstract:
This paper is built around ASTM E 2506, Standard Guide for Developing a Cost-Effective Risk Mitigation Plan for New and Existing Constructed Facilities. E 2506 establishes a three-step protocol—perform risk assessment, specify combinations of risk mitigation strategies for evaluation, and perform economic evaluation—to insure that the decision maker is provided the requisite information to choose the most cost effective combination of risk mitigation strategies. Because decisions associated with low-probability, high-consequence events involve uncertainty both in terms of appropriate evaluation procedures and event-related measures of likelihood and consequence, NIST developed a Risk Mitigation Toolkit. This paper uses (a) a data center undergoing renovation for improved security, and (b) a PVP-related failure event to illustrate how to perform the E 2506 three-step protocol with particular emphasis on the third step—perform economic evaluation. The third step is built around the Cost-Effectiveness Tool for Capital Asset Protection (CET), which was developed by NIST. Version 4.0 of CET is used to analyze the security- or failure-related event with a focus on consequence estimation and consequence assessment via Monte Carlo techniques. CET 4.0 includes detailed analysis and reporting features designed to identify key cost drivers, measure their impacts, and deliver estimated consequence parameters with uncertainty bounds. Significance of this economics-based intelligence (EI) tool is presented and discussed for security- or failure-consequence estimation to risk assessment of failure of critical structures or components.
APA, Harvard, Vancouver, ISO, and other styles
7

Dibb, Patrick, and Mohammad Hammoudeh. "Forensic Data Recovery from Android OS Devices: An Open Source Toolkit." In 2013 European Intelligence and Security Informatics Conference (EISIC). IEEE, 2013. http://dx.doi.org/10.1109/eisic.2013.58.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ormerod, Thomas, Lingyu Wang, Mourad Debbabi, Amr Youssef, Hamad Binsalleeh, Amine Boukhtouta, and Prosenjit Sinha. "Defaming Botnet Toolkits: A Bottom-Up Approach to Mitigating the Threat." In 2010 Fourth International Conference on Emerging Security Information, Systems and Technologies (SECURWARE). IEEE, 2010. http://dx.doi.org/10.1109/securware.2010.39.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography