首页> 外文学位 >A conceptual modeling language for the conceptions and misconceptions of cybersecurity.
【24h】

A conceptual modeling language for the conceptions and misconceptions of cybersecurity.

机译:用于网络安全的概念和误解的概念建模语言。

获取原文
获取原文并翻译 | 示例

摘要

Over the past ten years, has society become better with cyber defense efforts? Today, cyber attackers still have the ability to penetrate network defenses as they did ten years ago. In fact, cyberattacks have increased 48% in 2014 from 2013, an average of 117,339 more attackers per day (White, 2014).;Cyber defense decision makers typically have a basic understanding of cybersecurity policy, their architecture, and systems. But as these systems evolve, they become disconnected and rely on hearsay and conjecture or make decisions using outdated or misrepresented data.;This paper presents a formalized approach to building a theoretical abstraction to help reduce the risk of miscommunication at the foundational level when beginning to create new cybersecurity policies. The paper will explain issues that arise from current methodologies. What is the gap in Cybersecurity and what elements build an effective cybersecurity policy. A step-by-step approach demonstrating the formalized approach to building informal scenarios of the current environment and converting it to formalized text. Once a product of formalized text is created, it can be modeled using a foundation of entity diagrams combined with Object Role Modeling (ORM). Models have been adjusted and created to enable the reader to model at a conceptual abstraction instead of the logical abstraction, with an emphasis on cybersecurity. The paper continues with the benefits of a model that helps reduce confusion.;The paper concludes with the future possibilities and uses of a conceptual formalized approach and potential deliverables and uses for the recommended approach.;Keywords: Attributes, base facts, conceptual, cybersecurity, entity, logical, ORM, physical relationship, Stephen Maher.
机译:在过去的十年中,通过网络防御努力,社会会变得更好吗?如今,网络攻击者仍然能够像十年前一样渗透网络防御。实际上,2014年网络攻击比2013年增加了48%,平均每天增加117,339名攻击者(White,2014年)。网络防御决策者通常对网络安全策略,其体系结构和系统有基本的了解。但是随着这些系统的发展,它们变得脱节,并依赖传闻证据和猜想,或者使用过时或错误陈述的数据做出决策。制定新的网络安全政策。本文将解释由当前方法引起的问题。网络安全方面的差距是什么?哪些要素可以制定有效的网络安全政策。循序渐进的方法演示了构建当前环境的非正式方案并将其转换为形式化文本的形式化方法。创建形式化文本的产品后,可以使用实体图的基础与对象角色建模(ORM)相结合来对其进行建模。模型已经过调整和创建,以使读者能够以概念抽象而不是逻辑抽象来建模,重点是网络安全。本文继续提供有助于减少混乱的模型的好处;本文以概念化形式化方法的未来可能性和使用以及推荐方法的潜在可交付成果和使用作为结束语;关键字:属性,基本事实,概念,网络安全,实体,逻辑,ORM,物理关系,Stephen Maher。

著录项

  • 作者

    Stroup, Joshua T.;

  • 作者单位

    Utica College.;

  • 授予单位 Utica College.;
  • 学科 Computer science.;Information science.;Information technology.
  • 学位 M.S.
  • 年度 2015
  • 页码 49 p.
  • 总页数 49
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号