LEADER 05757nam 2200685Ia 450 001 9910139005803321 005 20230803020632.0 010 $a1-118-57994-1 010 $a1-118-58101-6 010 $a1-299-47554-X 010 $a1-118-57873-2 035 $a(CKB)2550000001020343 035 $a(EBL)1168523 035 $a(OCoLC)850220188 035 $a(SSID)ssj0000904891 035 $a(PQKBManifestationID)11476629 035 $a(PQKBTitleCode)TC0000904891 035 $a(PQKBWorkID)10923897 035 $a(PQKB)10478840 035 $a(MiAaPQ)EBC1168523 035 $a(Au-PeEL)EBL1168523 035 $a(CaPaEBR)ebr10687755 035 $a(CaONFJC)MIL478804 035 $a(EXLCZ)992550000001020343 100 $a20121116d2013 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aRisk propagation assessment for network security$b[electronic resource] $eapplication to airport communication network design /$fMohamed Slim Ben Mahmoud, Nicolas Larrieu, Alain Pirovano 210 $aHoboken, N.J. $cISTE Ltd/John Wiley and Sons Inc$d2013 215 $a1 online resource (139 p.) 225 1 $aFocus series in networks and telecommunications 300 $aDescription based upon print version of record. 311 $a1-84821-454-5 320 $aIncludes bibliographical references and index. 327 $aTitle Page; Contents; LIST OF FIGURES; LIST OF TABLES; INTRODUCTION; PART 1. NETWORK SECURITY RISK ASSESSMENT; CHAPTER 1. INTRODUCTION TO INFORMATION SYSTEMSECURITY RISK MANAGEMENT PROCESS; 1.1. On the importance of network security for network designers; 1.2. On the impact of risk assessment in the decision-making process for network security designers; 1.3. Quantitative versus qualitative risk assessment approaches; 1.4. Network security risk propagation concept; 1.4.1. Impact of node correlation; 1.4.2. Network security risk transitivity 327 $a1.4.3. Network security risk propagation illustrative caseCHAPTER 2. SECURITY RISK MANAGEMENTBACKGROUND; 2.1. Qualitative security risk management methods; 2.1.1. CRAMM; 2.1.2. OCTAVE; 2.1.3. EBIOS; 2.1.4. MEHARI; 2.1.5. CORAS; 2.1.6. Discussion; 2.2. Quantitative security risk assessment approaches; 2.3. Toward a quantitative propagation-based risk assessment methodology; CHAPTER 3. A QUANTITATIVE NETWORK RISK ASSESSMENT METHODOLOGY BASED ON RISK PROPAGATION; 3.1. Quantifying methodology parameters; 3.1.1. Network risk decomposition; 3.1.2. Node value; 3.1.3. Enhanced node value 327 $a3.1.4. Impact of threats3.1.5. Likelihood of threats; 3.2. Network security risk assessment process; 3.3. Conclusion; PART 2. APPLICATION TO AIRPORT COMMUNICATION NETWORK DESIGN; CHAPTER 4. THE AEROMACS COMMUNICATION SYSTEM IN THE SESAR PROJECT; 4.1. Overview of the European SESAR project; 4.2. Overview of aeronautical communications operating concept and requirements; 4.3. Introduction to the AeroMACS communication system; 4.3.1. AeroMACS protocol stack; 4.3.2. AeroMACS reference network architecture; 4.3.3. AeroMACS security considerations; 4.3.3.1. Analysis of AeroMACS securityweaknesses 327 $a4.3.4. AeroMACS reference network topology4.3.4.1. Isolated AeroMACS network architecture; 4.3.4.2. End-to-end AeroMACS network architecture; CHAPTER 5. AERONAUTICAL NETWORK CASE STUDY; 5.1. Experimental parameters; 5.1.1. Testbed infrastructure; 5.1.2. Aeronautical node values instantiation; 5.1.3. Aeronautical services instantiation; 5.1.4. Isolated vs. end-to-end emulation scenarios; 5.2. AeroMACS case study: experimental results; 5.2.1. Main inputs for emulation scenarios; 5.2.2. Isolated AeroMACS scenario: preliminary results; 5.2.2.1. Individual risks; 5.2.2.2. Propagated risks 327 $a5.2.2.3. Node and network risks5.2.3. Isolated AeroMACS scenario: EAP vs. RSA sub-scenario; 5.2.4. Preliminary AeroMACS security enhancement guidance; 5.2.5. AeroMACS implementation improvements: isolated scenario without operational server vulnerabilities; 5.2.5.1. Experimental inputs; 5.2.5.2. Network topology; 5.2.5.3. Vulnerability statistics; 5.2.5.4. Individual risk results; 5.2.5.5. Propagated risk results; 5.2.5.6. Network risk results; 5.2.6. AeroMACS topological improvements: isolated scenario with two ASN gateways; 5.2.6.1. Experimental inputs; 5.2.6.2. Network topology 327 $a5.2.6.3. Vulnerability statistics 330 $aThe focus of this book is risk assessment methodologies for network architecture design. The main goal is to present and illustrate an innovative risk propagation-based quantitative assessment tool. This original approach aims to help network designers and security administrators to design and build more robust and secure network topologies. As an implementation case study, the authors consider an aeronautical network based on AeroMACS (Aeronautical Mobile Airport Communications System) technology. AeroMACS has been identified as the wireless access network for airport surface communication 410 0$aFocus series in networks and telecommunications. 606 $aComputer networks$xSecurity measures$xDesign 606 $aAeronautics$xCommunication systems$xDesign and construction 615 0$aComputer networks$xSecurity measures$xDesign. 615 0$aAeronautics$xCommunication systems$xDesign and construction. 676 $a387.740426 700 $aBen Mahmoud$b Mohamed Slim$0862143 701 $aLarrieu$b Nicolas$0848341 701 $aPirovano$b Alain$0877248 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910139005803321 996 $aRisk propagation assessment for network security$91958792 997 $aUNINA