IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Proposed Isomorphic Graph Model for Risk Assessment on a Unix Operating System

Proposed Isomorphic Graph Model for Risk Assessment on a Unix Operating System
View Sample PDF
Author(s): Prashant Kumar Patra (College of Engineering & Technology, India)and Padma Lochan Pradhan (Sikha ‘O' Anusandhan University, India)
Copyright: 2015
Pages: 14
Source title: Transportation Systems and Engineering: Concepts, Methodologies, Tools, and Applications
Source Author(s)/Editor(s): Information Resources Management Association (USA)
DOI: 10.4018/978-1-4666-8473-7.ch022

Purchase

View Proposed Isomorphic Graph Model for Risk Assessment on a Unix Operating System on the publisher's website for pricing and purchasing information.

Abstract

Control and risk are the two parts of the coin. Risk assessment is the process of identifying uncertainties, vulnerabilities and threats to the operating system resources in order to achieve business objectives. Risk evaluation involved deciding what counter measures to take in reducing uncertainty to the lowest level of risk. Control is probably the most important aspect of communications security and becoming increasingly important as basic building block for system security. Advanced Encryption Standard (AES) is a primary method of protecting system resources. AES is inversely proportional to the Risk (C=K/R) & mean while control is directly proportional to the quality of standard. AES Control will be optimize the risk as well as improve the IS standard. Control is directly proportional to risk mitigation & mitigation is directly proportional to standard. This paper contributes to the development of an optimization method that aims to determine the optimal cost to be invested into security method, model & mechanisms deciding on the measure component of operating system resources (i.e. Processor, Memory & Encryption). Furthermore, the method & mechanism optimize the cost, time & resources is supposed to optimize the system risks. The proposed model would be update the value of Processor, Memory & Encryption key dynamically as per business requirement and availability of technology & resources. Proposed model is going to be optimizing risk and maximizing the performance. In this study the researchers develop an isomorphic graph model for optimizing risk in the Unix operating system.

Related Content

Fani Antoniou, Marina Marinelli, Kleopatra Petroutsatou. © 2024. 31 pages.
Konstantinos Kirytopoulos, Vasileios Sarlis, Dimitris Marinakis, Theodoros Kalogeropoulos. © 2024. 26 pages.
Konstantina Ragazou, Ioannis Passas, Alexandros Garefalakis, Constantin Zopounidis. © 2024. 24 pages.
Vannie Naidoo, Rajen Chetty. © 2024. 19 pages.
Alexandros E. Grigoras, Georgios N. Aretoulis, Fani Antoniou, Stylianos Karatzas. © 2024. 30 pages.
Kleopatra Petroutsatou, Theodora Vagdatli, Marina Chronaki, Panagiota Samouilidou. © 2024. 24 pages.
Dimitra Korakaki, Stratos Kartsonakis, Evangelos Grigoroudis, Constantin Zopounidis. © 2024. 34 pages.
Body Bottom