Security strategy models (SSM)

Conference paper


Ijeh, Anthony C., Preston, David, Imafidon, Chris and Williams, Godfried 2009. Security strategy models (SSM). Proceedings of Advances in Computing and Technology. (AC&T) The School of Computing and Technology 4th Annual Conference University of East London pp. 126-131
AuthorsIjeh, Anthony C., Preston, David, Imafidon, Chris and Williams, Godfried
TypeConference paper
Abstract

The aim of this research paper is to analyse the individual and collective information
security risks which could arise from using a security strategy model (SSM); the objective of creating
the SSM was so as to protect a wireless local area network (WLAN). As such the focus of this paper
shall be on the individual operational components used to create the SSM and the information security
risks which stem from their being part of the SSM. In order to review the components of the SSM the
paper shall use the BS ISO/IEC 17799:2005 which is the British Standard, International Standard and
also the European Standard for using Information Communication Technology (ICT) correctly in
order to effectively mitigate against the exposure of an organizations data to unauthorized access. The
general idea of using the BS ISO/IEC 17799:2005 is so that the SSM is created based on best practice
within the ICT industry of protecting confidential data or at least that the possible risks that stem from
using the SSM are mitigated against; this is also known as risk based auditing. Against this backdrop
the paper shall review each component of the SSM and use the risks to create a ‘Threat’ model which
would then be used to create a ‘Trust model in order to strengthen the confidentiality of any data that
passes through the SSM.

Keywordswireless local area network; computer security
Year2009
ConferenceProceedings of Advances in Computing and Technology
Publisher's version
License
CC BY-ND
Publication dates
Print2009
Publication process dates
Deposited27 Jul 2010
Web address (URL)http://www.uel.ac.uk/act/proceedings/documents/FinalProceedings.pdf
http://hdl.handle.net/10552/915
Additional information

Citation:
Ijeh, A.C. et al (2009) ‘Security strategy models (SSM).’ Proceedings of Advances in Computing and Technology, (AC&T) The School of Computing and Technology 4th Annual Conference, University of East London, pp.126-131.

Place of publicationUniversity of East London
Page range126-131
Permalink -

https://repository.uel.ac.uk/item/8644q

  • 6
    total views
  • 4
    total downloads
  • 3
    views this month
  • 1
    downloads this month