Reference Hub1
Threats Classification: State of the Art

Threats Classification: State of the Art

Mouna Jouini, Latifa Ben Arfa Rabai
ISBN13: 9781522501053|ISBN10: 1522501053|EISBN13: 9781522501060
DOI: 10.4018/978-1-5225-0105-3.ch016
Cite Chapter Cite Chapter

MLA

Jouini, Mouna, and Latifa Ben Arfa Rabai. "Threats Classification: State of the Art." Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security, edited by Brij Gupta, et al., IGI Global, 2016, pp. 368-392. https://doi.org/10.4018/978-1-5225-0105-3.ch016

APA

Jouini, M. & Rabai, L. B. (2016). Threats Classification: State of the Art. In B. Gupta, D. Agrawal, & S. Yamaguchi (Eds.), Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security (pp. 368-392). IGI Global. https://doi.org/10.4018/978-1-5225-0105-3.ch016

Chicago

Jouini, Mouna, and Latifa Ben Arfa Rabai. "Threats Classification: State of the Art." In Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security, edited by Brij Gupta, Dharma P. Agrawal, and Shingo Yamaguchi, 368-392. Hershey, PA: IGI Global, 2016. https://doi.org/10.4018/978-1-5225-0105-3.ch016

Export Reference

Mendeley
Favorite

Abstract

Information systems are frequently exposed to various types of threats which can cause different types of damages that might lead to significant financial losses. Information security damages can range from small losses to entire information system destruction. The effects of various threats vary considerably: some affect the confidentiality or integrity of data while others affect the availability of a system. Currently, organizations are struggling to understand what the threats to their information assets are and how to obtain the necessary means to combat them which continues to pose a challenge. To improve our understanding of security threats, we propose a security threat classification model which allows us to study the threats class impact instead of a threat impact as a threat varies over time. This chapter deals with the threats classification problem and its motivation. It addresses different criteria of information system security risks classification and gives a review of most threats classification models. We present as well recent surveys on security breaches costs.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.