Reference Hub1
Threats Classification: State of the Art

Threats Classification: State of the Art

Mouna Jouini, Latifa Ben Arfa Rabai
ISBN13: 9781522539230|ISBN10: 1522539239|EISBN13: 9781522539247
DOI: 10.4018/978-1-5225-3923-0.ch077
Cite Chapter Cite Chapter

MLA

Jouini, Mouna, and Latifa Ben Arfa Rabai. "Threats Classification: State of the Art." Computer Systems and Software Engineering: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, IGI Global, 2018, pp. 1851-1876. https://doi.org/10.4018/978-1-5225-3923-0.ch077

APA

Jouini, M. & Rabai, L. B. (2018). Threats Classification: State of the Art. In I. Management Association (Ed.), Computer Systems and Software Engineering: Concepts, Methodologies, Tools, and Applications (pp. 1851-1876). IGI Global. https://doi.org/10.4018/978-1-5225-3923-0.ch077

Chicago

Jouini, Mouna, and Latifa Ben Arfa Rabai. "Threats Classification: State of the Art." In Computer Systems and Software Engineering: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, 1851-1876. Hershey, PA: IGI Global, 2018. https://doi.org/10.4018/978-1-5225-3923-0.ch077

Export Reference

Mendeley
Favorite

Abstract

Information systems are frequently exposed to various types of threats which can cause different types of damages that might lead to significant financial losses. Information security damages can range from small losses to entire information system destruction. The effects of various threats vary considerably: some affect the confidentiality or integrity of data while others affect the availability of a system. Currently, organizations are struggling to understand what the threats to their information assets are and how to obtain the necessary means to combat them which continues to pose a challenge. To improve our understanding of security threats, we propose a security threat classification model which allows us to study the threats class impact instead of a threat impact as a threat varies over time. This chapter deals with the threats classification problem and its motivation. It addresses different criteria of information system security risks classification and gives a review of most threats classification models. We present as well recent surveys on security breaches costs.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.