期刊文献+
共找到1篇文章
< 1 >
每页显示 20 50 100
Scale, Complexity, and Cybersecurity Risk Management
1
作者 Christopher Briscoe Carl Young 《Journal of Information Security》 2024年第4期524-544,共21页
Elementary information theory is used to model cybersecurity complexity, where the model assumes that security risk management is a binomial stochastic process. Complexity is shown to increase exponentially with the n... Elementary information theory is used to model cybersecurity complexity, where the model assumes that security risk management is a binomial stochastic process. Complexity is shown to increase exponentially with the number of vulnerabilities in combination with security risk management entropy. However, vulnerabilities can be either local or non-local, where the former is confined to networked elements and the latter results from interactions between elements. Furthermore, interactions involve multiple methods of communication, where each method can contain vulnerabilities specific to that method. Importantly, the number of possible interactions scales quadratically with the number of elements in standard network topologies. Minimizing these interactions can significantly reduce the number of vulnerabilities and the accompanying complexity. Two network configurations that yield sub-quadratic and linear scaling relations are presented. 展开更多
关键词 complexity CYBERSECURITY SCALE Scaling Relations Stochastic Linear Non-Linear MACROSCOPIC Organized complexity disorganized complexity
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部