scholarly journals Measurement of Control Power in Corporate Networks

2021 ◽  
Vol 31 (1) ◽  
Author(s):  
Izabella Stach ◽  
Jacek Mercik

This paper discusses some game-theoretical methods for measuring indirect control in complex corporate shareholding networks. The methods use power indices in order to estimate the direct and indirect control in shareholding structures. Some of these methods only estimate the control power of investors (firms without shareholdings), and only a few measure the control power of all firms involved in shareholding networks (which means investors and stock companies). None of them take measuring the importance of mutual connections (edges in the networks) into consideration; thus we focus in particular on an extension of these methods in this paper in order to measure both the control-power of the firms involved in complex shareholding structures (represented by nodes in networks), and the importance (power) of linkages between the firms as elements of a whole corporate shareholding network. More precisely, we apply our approaches to a theoretical example of a corporate network. Moreover, we continue the considerations started in Mercik and Stach (Transactions on Computational Collective Intelligence XXXI, LNCS 11290: 64–79, 2018) about reasonable properties for indirect control measurement. Some ideas of new properties are proposed. The paper also provides a brief review of the literature concerning the topic.

2015 ◽  
Vol 21 (4) ◽  
pp. 648-651
Author(s):  
Lukas Tanutama ◽  
Gerrard Polla ◽  
Raymond Kosala ◽  
Richard Kumaradjaja

The competitive nature of Internet access service business drives Service Providers to find innovative revenue generators within their core competencies. Internet connection is the essential infrastructure in the current business environment. Service Providers provide the Internet connections to corporate networks. It processes network data to enable the Internet business communications and transactions. Mining the network data of a particular corporate network resulted in its business traffic profile or characteristics. Based on the discovered characteristics, this research proposes novel generic Value Added Services (VAS). The VAS becomes the innovative and competitive revenue generators. The VAS is competitive as only the Service Provider and its customer know the traffic profile. The knowledge becomes the barrier of entry for competitors. To offer the VAS, a Service Provider must build close relationship with its customer for acceptance.


Author(s):  
R. V. Kyrychok ◽  
◽  
G. V. Shuklin

The article considers the problem of determining and assessing the quality of the vulnerability validation mechanism of the information systems and networks. Based on the practical analysis of the vulnerability validation process and the analytical dependencies of the basic characteristics of the vulnerability validation quality obtained using the Bernstein polynomials, additional key indicators were identified and characterised, which make it possible to assert with high reliability about the positive progress or consequences of the vulnerability validation of the target corporate network. The intervals of these indicators were experimentally determined at which the vulnerability validation mechanism is of high quality. In addition, during the calculations, a single integral indicator was also derived to quantitatively assess the quality of the vulnerability validation mechanism of the corporate networks, and an experimental study was carried out, as well as the assessment of the quality of the automatic vulnerability validation mechanism of the db_autopwn plugin designed to automate the Metasploit framework vulnerability exploitation tool. As a result, it was proposed the methodology for analysing the quality of the vulnerability validation mechanism in the corporate networks, which allows one to quantify the quality of the validation mechanism under study, which in turn will allow real-time monitoring and control of the validation progress of the identified vulnerabilities. Also, in the study, the dependences of previously determined key performance indicators of the vulnerability validation mechanism on the rational cycle time were obtained, which makes it possible to build the membership functions for the fuzzy sets. The construction of these sets, in particular, allows making decisions with minimal risks for an active analysis of the security of corporate networks.


2020 ◽  
pp. 147737082091643
Author(s):  
Enrique Estellés-Arolas

Neighbours sharing information about robberies in their district through social networking platforms, citizens and volunteers posting about the irregularities of political elections on the Internet, and internauts trying to identify a suspect of a crime: in all these situations, people who share different degrees of relationship collaborate through the Internet and other technologies to try to help with or solve an offence. The crowd, which is sometimes seen as a threat, in these cases becomes an invaluable resource that can complement law enforcement through collective intelligence. Owing to the increasing growth of such initiatives, this article conducts a systematic review of the literature to identify the elements that characterize them and to find the conditions that make them work successfully.


2020 ◽  
Vol 10 (21) ◽  
pp. 7926
Author(s):  
Michał Walkowski ◽  
Maciej Krakowiak ◽  
Jacek Oko ◽  
Sławomir Sujecki

The time gap between public announcement of a vulnerability—its detection and reporting to stakeholders—is an important factor for cybersecurity of corporate networks. A large delay preceding an elimination of a critical vulnerability presents a significant risk to the network security and increases the probability of a sustained damage. Thus, accelerating the process of vulnerability identification and prioritization helps to red the probability of a successful cyberattack. This work introduces a flexible system that collects information about all known vulnerabilities present in the system, gathers data from organizational inventory database, and finally integrates and processes all collected information. Thanks to application of parallel processing and non relational databases, the results of this process are available subject to a negligible delay. The subsequent vulnerability prioritization is performed automatically on the basis of the calculated CVSS 2.0 and 3.1 scores for all scanned assets. The environmental CVSS vector component is evaluated accurately thanks to the fact that the environmental data is imported directly from the organizational inventory database.


2019 ◽  
pp. 497-513
Author(s):  
Ivan D. Burke ◽  
Renier P. van Heerden

Data breaches are becoming more common and numerous every day, where huge amount of data (corporate and personal) are leaked more frequently than ever. Corporate responses to data breaches are insufficient, when commonly remediation is minimal. This research proposes that a similar approach to physical pollution (environmental pollution) can be used to map and identify data leaks as Cyber pollution. Thus, IT institutions should be made aware of their contribution to Cyber pollution in a more measurable method. This article defines the concept of cyber pollution as: security vulnerable (such as unmaintained or obsolete) devices that are visible through the Internet and corporate networks. This paper analyses the recent state of data breach disclosures Worldwide by providing statistics on significant scale data breach disclosures from 2014/01 to 2016/12. Ivan Burke and Renier van Heerden model security threat levels similar to that of pollution breaches within the physical environment. Insignificant security openings or vulnerabilities can lead to massive exploitation of entire systems. By modelling these breaches as pollution, the aim is to introduce the concept of cyber pollution. Cyber pollution is a more tangible concept for IT managers to relay to staff and senior management. Using anonymised corporate network traffic with Open Source penetration testing software, the model is validated.


2021 ◽  
pp. 73-93
Author(s):  
Jochen Staudacher ◽  
Linus Olsson ◽  
Izabella Stach

This article is devoted to research methods for applying of scheme of packet filtering rules. The scheme of the Firewall is developed on corporate network to allow protect the network system from information security threat. Use of Firewall in different mode of protection in the corporate networks is given which is accessed to segment information resources under the administrator's rules. Filtering packets rule is worked out according to the state of the virtual connection that the process moving of packets is determined by flags and sequence numbers of head IP addresses. The system logging log is designed to record a message about events that involve firewall operating system management activities and events that are fraught with an intersection-related event log. Consequently, the offered rules of packet filtering protected the network traffic from unwanted action. Furthermore, the rules of packet filtering is formed, allowing to observe and management access to resource users on the Web content.


2020 ◽  
Vol 12 (2) ◽  
pp. 45-61
Author(s):  
Adriano Borrego ◽  
Adilson Eduardo Guelfi ◽  
Anderson Aparecido Alves da Silva ◽  
Marcelo Teixeira de Azevedo ◽  
Norisvaldo Ferraz Jr ◽  
...  

Industrial Control Systems (ICS) networks offer a high level of automation combined with high levels of control, quality,and process improvement. Since network corporate users have to access the ICS environment, these networks have to be interconnected. However, this interconnection can introduce risks to the systems and manufacturing processes, which leads to the need to ensure the interconnection is done safely. The objective of this paper is to perform modeling and validation of a proposed secure interconnection between ICS and corporate networks using Colored Petri Networks (CPN). In addition to the best practices published in related works, this paper recommends some integrated features like the use of terminal server service, secure manual uplinks, and unidirectional security gatewayto enhance environmental security. However, our main contribution is the validation process performed in a CPN, which made it possible to execute queries in the state space resulting from the simulation -that works as a proof of concept. As a result, thepaper presents a secure and validated model of interconnection between ICS and corporate networks, capable of being applied to any interconnection environment


2021 ◽  
Vol 22 (1) ◽  
pp. 118-128
Author(s):  
BAHODIR MUMINOV ◽  
Ulugbek Bekmurodov

It is enough to have 3 basic stages of the modules in the SPD of a diversified corporate network: (F) - the method of submitting the request, i.e. the method of forming the expression of the information needs of the system user (S) - the function of the correspondence of the electronic resource to the request degree of compliance with the request and the found electronic resource; (V) - method of presenting electronic resources. Combining these three stages for models, methods, and software modules of the AML, is referred to as FSV technology (FSV platform, FSV Framework). FSV technology is an instrumental software platform based on a client-server architecture, integration and modification of models, and methods and algorithms of AML in the information environment of corporate networks. The following architecture has been developed for the FSV technology proposed for the search index in data retrieval systems. ABSTRAK: Tiga peringkat asas modul adalah cukup dalam pelbagai rangkaian korporat SPD iaitu: (F) - kaedah penyerahan permintaan, kaedah membentuk ungkapan keperluan maklumat pengguna sistem (S) - fungsi surat-menyurat sumber elektronik bagi permintaan tahap pematuhan permintaan dan sumber elektronik yang dijumpai; (V) - kaedah penyampaian sumber elektronik. Gabungan tiga peringkat model, kaedah dan modul perisian AML, dipanggil teknologi FSV (platform FSV, rangka FSV). Teknologi FSV adalah platform perisian instrumen berdasarkan seni bina pelanggan-pelayan, integrasi dan pengubah suaian model, kaedah-kaedah dan algoritma AML dalam persekitaran maklumat dalam rangkaian korporat. Seni bina ini telah di bina bagi teknologi FSV yang dicadangkan bagi indeks carian dalam sistem dapatan data.


Sign in / Sign up

Export Citation Format

Share Document