Ontology Based Security Threat Assessment and Mitigation for Cloud Systems Page: 66
xii, 155 pagesView a full description of this dissertation.
Extracted Text
The following text was automatically extracted from the image on this page using optical character recognition software:
to specific types of attacks. An organization can define different priorities for different types
of attacks based on their business models.
Our model is illustrated in Fig. 4.19. The model starts with a vulnerability discovery
process (powered by the VULCAN Framework shown in Fig. 4.1) for a cloud application
(or a system) and produces a rank ordered list of vulnerabilities and a rank ordered list of
security threat types.
Such information can be used for:
(1) Security Auditing
(2) Risk Assessment and Risk Management
(3) Vulnerability Management
(4) Cyber Security Automation
(5) Cloud Computing Security
In the subsequent Section 4.3.2 to Section 4.3.4, we will provide the background
pertinent to this work and then present our model for risk quantification.
AWS Nessus 3 VULCAN
2. Scanner Framework
E C2
Attack
App. User Graph
Dynamic 4. Tool
6. Input
7-Ranked Generated
Attack Paths 5. Graph
FIGURE 4.19. Vulnerabilities Ranking Methodology66
Upcoming Pages
Here’s what’s next.
Search Inside
This dissertation can be searched. Note: Results may vary based on the legibility of text within the document.
Tools / Downloads
Get a copy of this page or view the extracted text.
Citing and Sharing
Basic information for referencing this web page. We also provide extended guidance on usage rights, references, copying or embedding.
Reference the current page of this Dissertation.
Kamongi, Patrick. Ontology Based Security Threat Assessment and Mitigation for Cloud Systems, dissertation, December 2018; Denton, Texas. (https://digital.library.unt.edu/ark:/67531/metadc1404576/m1/79/: accessed July 17, 2024), University of North Texas Libraries, UNT Digital Library, https://digital.library.unt.edu; .