VGTU talpykla >
Doktorantūros skyrius / Department for Doctoral Studies >
Technologijos mokslų daktaro disertacijos ir jų santraukos >
Please use this identifier to cite or link to this item:
|Title: ||Method of Information Security Risk Analysis for Virtualized System|
|Authors: ||Janulevičius, Justinas|
|Issue Date: ||2016|
|Publisher: ||VGTU leidykla „Technika“|
|Citation: ||Janulevičius, J. 2016. Method of Information Security Risk Analysis for Virtualized System: daktaro disertacija. Vilnius: Technika, 112 p.|
|Abstract: ||The growth of usage of Information Technology (IT) in daily operations of enterprises causes the value and the vulnerability of information to be at the peak of interest. Moreover, distributed computing revolutionized the out-sourcing of computing functions, thus allowing flexible IT solutions. Since the concept of information goes beyond the traditional text documents, reaching manufacturing, machine control, and, to a certain extent – reasoning – it is a great responsibility to maintain appropriate information security.
Information Security (IS) risk analysis and maintenance require extensive knowledge about the possessed assets as well as the technologies behind them, to recognize the threats and vulnerabilities the infrastructure is facing. A way of formal description of the infrastructure – the Enterprise Architecture (EA) – offers a multiperspective view of the whole enterprise, linking together business processes as well as the infrastructure. Several IS risk analysis solutions based on the EA exist. However, lack of methods of IS risk analysis for virtualization technologies complicates the procedure, thus leading to reduced availability of such analysis.
The dissertation consists of an introduction, three main chapters and general conclusions. The first chapter introduces the problem of information security risk analysis and its’ automation. Moreover, state-of-the-art methodologies and their implementations for automated information security risk analysis are discussed.
The second chapter proposes a novel method for risk analysis of virtualization components based on the most recent data, including threat classification and specification, control means and metrics of the impact.
The third chapter presents an experimental evaluation of the proposed method, implementing it to the Cyber Security Modeling Language (CySeMoL) and comparing the analysis results to well-calibrated expert knowledge.
It was concluded that the automation of virtualization solution risk analysis provides sufficient data for adjustment and implementation of security controls to maintain optimum security level.|
|Appears in Collections:||Technologijos mokslų daktaro disertacijos ir jų santraukos|
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.