Security Risk Analysis based on Data Criticality

Nowadays, security risk assessment has become an integral part of network security as everyday life has become interconnected with and dependent on computer networks. There are various types of data in the network, often with different criticality in terms of availability or confidentiality or integ...

Full description

Bibliographic Details
Main Author: Zhou, Luyuan
Format: Others
Language:English
Published: Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM) 2020
Subjects:
Online Access:http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-93055
id ndltd-UPSALLA1-oai-DiVA.org-lnu-93055
record_format oai_dc
spelling ndltd-UPSALLA1-oai-DiVA.org-lnu-930552020-04-10T03:40:16ZSecurity Risk Analysis based on Data CriticalityengZhou, LuyuanLinnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM)2020network security risk assessmentattack graphdata criticalitysecurity metricthreat modelingSoftware EngineeringProgramvaruteknikNowadays, security risk assessment has become an integral part of network security as everyday life has become interconnected with and dependent on computer networks. There are various types of data in the network, often with different criticality in terms of availability or confidentiality or integrity of information. Critical data is riskier when it is exploited. Data criticality has an impact on network security risks. The challenge of diminishing security risks in a specific network is how to conduct network security risk analysis based on data criticality. An interesting aspect of the challenge is how to integrate the security metric and the threat modeling, and how to consider and combine the various elements that affect network security during security risk analysis. To the best of our knowledge, there exist no security risk analysis techniques based on threat modeling that consider the criticality of data. By extending the security risk analysis with data criticality, we consider its impact on the network in security risk assessment. To acquire the corresponding security risk value, a method for integrating data criticality into graphical attack models via using relevant metrics is needed. In this thesis, an approach for calculating the security risk value considering data criticality is proposed. Our solution integrates the impact of data criticality in the network by extending the attack graph with data criticality. There are vulnerabilities in the network that have potential threats to the network. First, the combination of these vulnerabilities and data criticality is identified and precisely described. Thereafter the interaction between the vulnerabilities through the attack graph is taken into account and the final security metric is calculated and analyzed. The new security metric can be used by network security analysts to rank security levels of objects in the network. By doing this, they can find objects that need to be given additional attention in their daily network protection work. The security metric could also be used to help them prioritize vulnerabilities that need to be fixed when the network is under attack. In general, network security analysts can find effective ways to resolve exploits in the network based on the value of the security metric. Student thesisinfo:eu-repo/semantics/bachelorThesistexthttp://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-93055application/pdfinfo:eu-repo/semantics/openAccess
collection NDLTD
language English
format Others
sources NDLTD
topic network security risk assessment
attack graph
data criticality
security metric
threat modeling
Software Engineering
Programvaruteknik
spellingShingle network security risk assessment
attack graph
data criticality
security metric
threat modeling
Software Engineering
Programvaruteknik
Zhou, Luyuan
Security Risk Analysis based on Data Criticality
description Nowadays, security risk assessment has become an integral part of network security as everyday life has become interconnected with and dependent on computer networks. There are various types of data in the network, often with different criticality in terms of availability or confidentiality or integrity of information. Critical data is riskier when it is exploited. Data criticality has an impact on network security risks. The challenge of diminishing security risks in a specific network is how to conduct network security risk analysis based on data criticality. An interesting aspect of the challenge is how to integrate the security metric and the threat modeling, and how to consider and combine the various elements that affect network security during security risk analysis. To the best of our knowledge, there exist no security risk analysis techniques based on threat modeling that consider the criticality of data. By extending the security risk analysis with data criticality, we consider its impact on the network in security risk assessment. To acquire the corresponding security risk value, a method for integrating data criticality into graphical attack models via using relevant metrics is needed. In this thesis, an approach for calculating the security risk value considering data criticality is proposed. Our solution integrates the impact of data criticality in the network by extending the attack graph with data criticality. There are vulnerabilities in the network that have potential threats to the network. First, the combination of these vulnerabilities and data criticality is identified and precisely described. Thereafter the interaction between the vulnerabilities through the attack graph is taken into account and the final security metric is calculated and analyzed. The new security metric can be used by network security analysts to rank security levels of objects in the network. By doing this, they can find objects that need to be given additional attention in their daily network protection work. The security metric could also be used to help them prioritize vulnerabilities that need to be fixed when the network is under attack. In general, network security analysts can find effective ways to resolve exploits in the network based on the value of the security metric.
author Zhou, Luyuan
author_facet Zhou, Luyuan
author_sort Zhou, Luyuan
title Security Risk Analysis based on Data Criticality
title_short Security Risk Analysis based on Data Criticality
title_full Security Risk Analysis based on Data Criticality
title_fullStr Security Risk Analysis based on Data Criticality
title_full_unstemmed Security Risk Analysis based on Data Criticality
title_sort security risk analysis based on data criticality
publisher Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM)
publishDate 2020
url http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-93055
work_keys_str_mv AT zhouluyuan securityriskanalysisbasedondatacriticality
_version_ 1719312905793437696