Skip to main content

A Model for Calculating Damage Potential in Computer Systems

Abstract For systems having computers as a significant component, it becomes a critical task to identify the potential threats that the users of the system can present, while being both inside and outside the system. One of the most important factors that differentiate an insider from an outsider is the fact that the insider being a part of the system, owns privileges that enable him/her access to the resources and processes of the system through valid capabilities. An insider with malicious intent can potentially be more damaging compared to outsiders. The above differences help to understand the notion and scope of an insider.

The significant loss to organizations due to the failure to detect and mitigate the insider threat has resulted in an inc... (more)
Created Date 2019
Contributor Nolastname, Sharad (Author) / Bazzi, Rida (Advisor) / Sen, Arunabha (Committee member) / Doupé, Adam (Committee member) / Arizona State University (Publisher)
Subject Computer science / Availability Attack / Insider attack / Threat Value
Type Masters Thesis
Extent 70 pages
Language English
Note Masters Thesis Computer Science 2019
Collaborating Institutions Graduate College / ASU Library
Additional Formats MODS / OAI Dublin Core / RIS

  Full Text
1.2 MB application/pdf
Download Count: 24

Description Dissertation/Thesis