Attack Graphs and Scenario Driven Wireless Computer Network Defense

2013 ◽  
pp. 774-791
Author(s):  
Peter J. Hawrylak ◽  
George Louthan ◽  
Jeremy Daily ◽  
John Hal ◽  
Mauricio Papa

This chapter describes how to use attack graphs to evaluate the security vulnerabilities of an embedded computer network and provides example cases of this technique. Attack graphs are powerful tools available to system administrators to identify and manage vulnerabilities. Attack graphs describe the steps an adversary could take to reach a desired goal and can be analyzed to quantify risk. The systems investigated in this chapter are embedded systems that span hardware, software, and network communication. The example cases studied will be (1) radio frequency identification (RFID), (2) vehicle networks, and (3) the Smart Grid (the next generation power and distribution network in the USA).

Author(s):  
Peter J. Hawrylak ◽  
George Louthan ◽  
Jeremy Daily ◽  
John Hal ◽  
Mauricio Papa

This chapter describes how to use attack graphs to evaluate the security vulnerabilities of an embedded computer network and provides example cases of this technique. Attack graphs are powerful tools available to system administrators to identify and manage vulnerabilities. Attack graphs describe the steps an adversary could take to reach a desired goal and can be analyzed to quantify risk. The systems investigated in this chapter are embedded systems that span hardware, software, and network communication. The example cases studied will be (1) radio frequency identification (RFID), (2) vehicle networks, and (3) the Smart Grid (the next generation power and distribution network in the USA).


2017 ◽  
Vol 25 (1) ◽  
pp. 21-42 ◽  
Author(s):  
Wesley Kukard ◽  
Lincoln Wood

This research explores how perceived consumer benefits affect the perceived privacy risks from implementation of Radio Frequency Identification (RFID) tags at an item-level in the Fast Moving Consumer Goods (FMCG) industry. Two new categories measure the benefits and risks: in-store and after-sales. These specific categories allow the respondents' willingness to accept RFID to be evaluated using a quantitative survey focused on the primary household grocery purchasers within the USA. The results suggest differences in perceptions of the in-store and after-sales risks and benefits of RFID use. While consumers are aware of privacy risks while using RFID technology, they would be willing to use the technology if sufficient benefits are available. This research moves the discussion away from a focus on consumer privacy issues to a balanced privacy/benefits approach for consumers and how that might affect their technology acceptance, suggesting that careful management of consumer benefits might allow FMCG firms to introduce RFID technology to support their global supply chains.


2014 ◽  
Vol 9 (2) ◽  
Author(s):  
Zhao Wei ◽  
Chunhe Xia ◽  
Yang Luo ◽  
Xiaochen Liu ◽  
Weikang Wu

Author(s):  
Kevin B. Bennett ◽  
Adam Bryant ◽  
Christen Sushereba

Objective: A prototype ecological interface for computer network defense (CND) was developed. Background: Concerns about CND run high. Although there is a vast literature on CND, there is some indication that this research is not being translated into operational contexts. Part of the reason may be that CND has historically been treated as a strictly technical problem, rather than as a socio-technical problem. Methods: The cognitive systems engineering (CSE)/ecological interface design (EID) framework was used in the analysis and design of the prototype interface. A brief overview of CSE/EID is provided. EID principles of design (i.e., direct perception, direct manipulation and visual momentum) are described and illustrated through concrete examples from the ecological interface. Results: Key features of the ecological interface include (a) a wide variety of alternative visual displays, (b) controls that allow easy, dynamic reconfiguration of these displays, (c) visual highlighting of functionally related information across displays, (d) control mechanisms to selectively filter massive data sets, and (e) the capability for easy expansion. Cyber attacks from a well-known data set are illustrated through screen shots. Conclusion: CND support needs to be developed with a triadic focus (i.e., humans interacting with technology to accomplish work) if it is to be effective. Iterative design and formal evaluation is also required. The discipline of human factors has a long tradition of success on both counts; it is time that HF became fully involved in CND. Application: Direct application in supporting cyber analysts.


2011 ◽  
Author(s):  
Justin M. Beaver ◽  
Chad A. Steed ◽  
Robert M. Patton ◽  
Xiaohui Cui ◽  
Matthew Schultz

Sign in / Sign up

Export Citation Format

Share Document