Formal threat descriptions for enhancing governmental risk assessment
Proceedings of the 1st international conference on Theory and practice of electronic governance
Ontological Vulnerability Assessment
WISE '08 Proceedings of the 2008 international workshops on Web Information Systems Engineering
SSIP'08 Proceedings of the 8th conference on Signal, Speech and image processing
Ontology-based security assessment for software products
Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies
OVM: an ontology for vulnerability management
Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies
An information security ontology incorporating human-behavioural implications
Proceedings of the 2nd international conference on Security of information and networks
A video monitoring system using ontology-driven identification of threats
HSI'09 Proceedings of the 2nd conference on Human System Interactions
Security issues for the use of semantic web in e-commerce
BIS'07 Proceedings of the 10th international conference on Business information systems
Ontology-based decision support for security management in heterogeneous networks
ICIC'09 Proceedings of the Intelligent computing 5th international conference on Emerging intelligent computing technology and applications
Enforcing security in semantics driven policy based networks
Computer Standards & Interfaces
Basis for an integrated security ontology according to a systematic review of existing proposals
Computer Standards & Interfaces
Hi-index | 0.00 |
IT-security has become a much diversified field and small and medium sized enterprises (SMEs), in particular, do not have the financial ability to implement a holistic IT-security approach. We thus propose a security ontology, to provide a solid base for an applicable and holistic IT-security approach for SMEs, enabling low-cost risk management and threat analysis. Based on the taxonomy of computer security and dependability by Landwehr [1], a heavy-weight ontology can be used to organize and systematically structure knowledge on threats, safeguards, and assets. Using this ontology, each threat scenario can be simulated with a different protection profile as to evaluate the effectiveness and the cost/benefit ratio of individual safeguards.