Threats Classification: State of the Art

Threats Classification: State of the Art

Mouna Jouini (ISG Tunis, Tunisia) and Latifa Ben Arfa Rabai (ISG Tunis, Tunisia)
DOI: 10.4018/978-1-5225-0105-3.ch016
OnDemand PDF Download:
No Current Special Offers


Information systems are frequently exposed to various types of threats which can cause different types of damages that might lead to significant financial losses. Information security damages can range from small losses to entire information system destruction. The effects of various threats vary considerably: some affect the confidentiality or integrity of data while others affect the availability of a system. Currently, organizations are struggling to understand what the threats to their information assets are and how to obtain the necessary means to combat them which continues to pose a challenge. To improve our understanding of security threats, we propose a security threat classification model which allows us to study the threats class impact instead of a threat impact as a threat varies over time. This chapter deals with the threats classification problem and its motivation. It addresses different criteria of information system security risks classification and gives a review of most threats classification models. We present as well recent surveys on security breaches costs.
Chapter Preview

1. Security Threats Classification

We show in this section a general overview of security threats classifications. In fact, we illustrates based on some statistics often security threats incidents cause damage to organizations. Then we present the merits and motivations of threats classifications model. Finally, we enumerate some principles that a threat classification should meet in order to evaluate the threats classifications models.

Complete Chapter List

Search this Book: