PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

A Novel Approach to National-level Cyber Risk Assessment Based on Vulnerability Management and Threat Intelligence

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
Real-time assessment of IT-related risks, performed at the national level, is very important due to the evolving nature of threats that may originate from individual hackers, organized cyber-criminal groups, as well as state activities. Evaluation of risk that is based on technical information, as well as on mutual relationships between various institutions and services, may result in very valuable situational awareness. The paper describes (in general) cyber risk analysis method which will be implemented in Polish National Cybersecurity Platform.
Rocznik
Tom
Strony
5--14
Opis fizyczny
Bibliogr. 26 poz., rys., tab.
Twórcy
  • Information Security Methods Team, Research and Academic Computer Network (NASK), Kolska 12, 01-045 Warsaw, Poland
autor
  • Information Security Methods Team, Research and Academic Computer Network (NASK), Kolska 12, 01-045 Warsaw, Poland
  • Information Security Methods Team, Research and Academic Computer Network (NASK), Kolska 12, 01-045 Warsaw, Poland
Bibliografia
  • [1] M. Janiszewski, A. Felkner, and J. Olszak, “Trust and risk assessment model of popular software based on known vulnerabilities”, Int. J. of Electron. and Telecommun., vol. 63, pp. 329–336, 2017 (doi: 10.1515/eletel-2017-0044).
  • [2] IBM OpenPages with Watson [Online]. Available: https://www.ibm.com/us-en/marketplace/governance-risk-andcompliance (accessed 23.11.2018).
  • [3] Data Center Management and Network Management Software from Device42 Software [Online]. Available: https://www.device42.com/ (accessed 23.11.2018).
  • [4] Helix Discovery – BMC Software [Online]. Available: https://www.bmc.com/it-solutions/discovery-dependencymapping.html (accessed 23.11.2018).
  • [5] Asset Inventory [Online]. Available: https://www.qualys.com/apps/ asset-inventory/ (accessed 23.11.2018).
  • [6] Integrated Risk Management [Online]. Available: https://www.rsa.com/en-us/products/integrated-risk-management (accessed 23.11.2018).
  • [7] Products by Category – ServiceNow [Online]. Available: https://www.servicenow.com/products-by-category.html (accessed 23.11.2018).
  • [8] NECOMA [Online]. Available: http://www.necoma-project.eu/ (accessed 26.11.2018).
  • [9] n6 – network security incident exchange [Online]. Available: https://n6.cert.pl/ (accessed 26.11.2018).
  • [10] PhishTank [Online]. Available: https://www.phishtank.com (accessed 26.11.2018).
  • [11] NECOMA Nippon-European Cyberdefense-Oriented Multilayer threat Analysis “Deliverable D1.4: Threat Data Final Report” April 20th, 2016 [Online]. Available: http://www.necoma-project.eu/ m/filer public/55/ec/55ec2e53-14fa-40f4-a67f-c7a092cfe463/ necoma-d14.pdf (accessed 26.11.2018).
  • [12] NECOMA Nippon-European Cyberdefense-Oriented Multilayer threat Analysis “Deliverable D3.1: Policy Enforcement Point Survey” November 30th, 2013 [Online]. Available: http://www.necoma-project.eu/m/filer public/0e/75/0e75c773a857-416b-99a0-090ec0b38388/necoma-d31r207.pdf (accessed 26.11.2018).
  • [13] PANOPTESEC [Online]. Available: http://www.panoptesec.eu (accessed 26.11.2018).
  • [14] PANOPTESEC Dynamic Risk Approaches for Automated Cyber Defence “D3.1.2: System High Level Design” March 27th, 2015 [Online]. Available: http://www.panoptesec.eu/dissemination/ FP7-ICT-610416-PANOPTESEC D312 v2.0-QA-Approved.pdf (accessed 26.11.2018).
  • [15] PANOPTESEC Dynamic Risk Approaches for Automated Cyber Defence “D5.1.1 – Response System for Dynamic Risk Management Requirements” March 27th, 2015 [Online]. Available: http://www.panoptesec.eu/dissemination/FP7-ICT-610416PANOPTESEC D511 v2.1-QA-Approved.pdf (accessed 26.11.2018).
  • [16] PANOPTESEC Dynamic Risk Approaches for Automated Cyber Defence “D6.3.2: Visualization Integration Prototype Report” June 30th, 2016 [Online]. Available: http://www.panoptesec.eu/ dissemination/FP7-ICT-610416-PANOPTESEC D632 v1.0-QAApproved.pdf (accessed 26.11.2018).
  • [17] PANOPTESEC Dynamic Risk Approaches for Automated Cyber Defence “D7.4.2 Demonstration System Prototype Report” November 5th, 2016 [Online]. Available: http://www.panoptesec.eu/ dissemination/FP7-ICT-610416-PANOPTESEC D742 v1.1.pdf (accessed 26.11.2018).
  • [18] Deliverables [Online]. Available: https://cyberwiser.eu/deliverables (accessed 26.11.2018).
  • [19] CYBERWISER.eu – Cyber Range & Capacity Building in Cybersecurity [Online]. Available: https://www.cyberwiser.eu (accessed 26.11.2018).
  • [20] Wide – Impact cyber Security Risk framework “D3.1 – Cyber Risk Patterns” May 31st, 2016 [Online]. Available: https://cyberwiser.eu/ system/files/WISER D3 1 v10 0.pdf (accessed 26.11.2018).
  • [21] Wide – Impact cyber Security Risk framework “D3.4 Cyber Risk Modelling Language and Guidelines, Final Version” March 29th, 2017 [Online]. Available: https://cyberwiser.eu/system/files/ WISER D3 4 v10 0.pdf (accessed 26.11.2018).
  • [22] Protective – Proactive Risk Management through Improved Cyber Situational Awareness [Online]. Available: https://protectiveh2020.eu (accessed 26.11.2018).
  • [23] PROTECTIVE Proactive Risk Management through Improved Cyber Situational Awareness “D6.1 Framework Specification” June 28th, 2017 [Online]. Available: https://protective-h2020.eu/ wp-content/uploads/2017/07/PROTECTIVE-D6.1-E-0417Framework-Specification.pdf
  • [24] PROTECTIVE Proactive Risk Management through Improved Cyber Situational Awareness “D2.1 Requirements Capture, Specification, Architectural Design and Model” June 15th, 2017 [Online]. Available: https://protective-h2020.eu/wp-content/uploads/2017/ 07/PROTECTIVE-D2.1-E-0615-Requirements Architecture.pdf (accessed 26.11.2018).
  • [25] “Directive (EU) 2016/1148 of the European Parliament and of the Council of 6 July 2016 concerning measures for a high common level of security of network and information systems across the Union” [Online]. Available: https://eur-lex.europa.eu/legal-content/EN/ TXT/PDF/?uri=CELEX:32016L1148&rid=1
  • [26] A. Felkner, “Przegląd i analiza źródeł informacji o podatnościach (Review and analysis of sources of information about vulnerabilities)”, Przegląd Telekomunikacyjny + Wiadomości Telekomunikacyjne, vol. 8-9/2016, 2016, pp. 929–933 (doi: 10.15199/59.2016.8-9.37) [in Polish].
Uwagi
Opracowanie rekordu w ramach umowy 509/P-DUN/2018 ze środków MNiSW przeznaczonych na działalność upowszechniającą naukę (2019).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-290ec8ba-5149-4340-91be-06b51a6c96a7
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.