LEADER 00000nam a22005893i 4500 
001    EBC1168523 
003    MiAaPQ 
005    20200713055242.0 
006    m     o  d |       
007    cr cnu|||||||| 
008    200713s2013    xx      o     ||||0 eng d 
020    9781118581018|q(electronic bk.) 
020    |z9781118579947 
035    (MiAaPQ)EBC1168523 
035    (Au-PeEL)EBL1168523 
035    (CaPaEBR)ebr10687755 
035    (CaONFJC)MIL478804 
035    (OCoLC)850220188 
040    MiAaPQ|beng|erda|epn|cMiAaPQ|dMiAaPQ 
050  4 TK51505.59.B46 -- R57 2013eb 
082 0  387.740426 
100 1  Larrieu, Nicolas 
245 10 Risk Propagation Assessment for Network Security :
       |bApplication to Airport Communication Network Design 
250    1st ed 
264  1 Hoboken :|bJohn Wiley & Sons, Incorporated,|c2013 
264  4 |c©2013 
300    1 online resource (139 pages) 
336    text|btxt|2rdacontent 
337    computer|bc|2rdamedia 
338    online resource|bcr|2rdacarrier 
490 1  FOCUS 
505 0  Intro -- Title Page -- Contents -- LIST OF FIGURES -- LIST
       OF TABLES -- INTRODUCTION -- PART 1. NETWORK SECURITY RISK
       ASSESSMENT -- CHAPTER 1. INTRODUCTION TO INFORMATION 
       SYSTEM SECURITY RISK MANAGEMENT PROCESS -- 1.1. On the 
       importance of network security for network designers -- 
       1.2. On the impact of risk assessment in the decision-
       making process for network security designers -- 1.3. 
       Quantitative versus qualitative risk assessment approaches
       -- 1.4. Network security risk propagation concept -- 
       1.4.1. Impact of node correlation -- 1.4.2. Network 
       security risk transitivity -- 1.4.3. Network security risk
       propagation illustrative case -- CHAPTER 2. SECURITY RISK 
       MANAGEMENT BACKGROUND -- 2.1. Qualitative security risk 
       management methods -- 2.1.1. CRAMM -- 2.1.2. OCTAVE -- 
       2.1.3. EBIOS -- 2.1.4. MEHARI -- 2.1.5. CORAS -- 2.1.6. 
       Discussion -- 2.2. Quantitative security risk assessment 
       approaches -- 2.3. Toward a quantitative propagation-based
       risk assessment methodology -- CHAPTER 3. A QUANTITATIVE 
       NETWORK RISK ASSESSMENT METHODOLOGY BASED ON RISK 
       PROPAGATION -- 3.1. Quantifying methodology parameters -- 
       3.1.1. Network risk decomposition -- 3.1.2. Node value -- 
       3.1.3. Enhanced node value -- 3.1.4. Impact of threats -- 
       3.1.5. Likelihood of threats -- 3.2. Network security risk
       assessment process -- 3.3. Conclusion -- PART 2. 
       APPLICATION TO AIRPORT COMMUNICATION NETWORK DESIGN -- 
       CHAPTER 4. THE AEROMACS COMMUNICATION SYSTEM IN THE SESAR 
       PROJECT -- 4.1. Overview of the European SESAR project -- 
       4.2. Overview of aeronautical communications operating 
       concept and requirements -- 4.3. Introduction to the 
       AeroMACS communication system -- 4.3.1. AeroMACS protocol 
       stack -- 4.3.2. AeroMACS reference network architecture --
       4.3.3. AeroMACS security considerations -- 4.3.3.1. 
       Analysis of AeroMACS securityweaknesses -- 4.3.4. AeroMACS
       reference network topology 
505 8  4.3.4.1. Isolated AeroMACS network architecture -- 
       4.3.4.2. End-to-end AeroMACS network architecture -- 
       CHAPTER 5. AERONAUTICAL NETWORK CASE STUDY -- 5.1. 
       Experimental parameters -- 5.1.1. Testbed infrastructure -
       - 5.1.2. Aeronautical node values instantiation -- 5.1.3. 
       Aeronautical services instantiation -- 5.1.4. Isolated vs.
       end-to-end emulation scenarios -- 5.2. AeroMACS case study
       : experimental results -- 5.2.1. Main inputs for emulation
       scenarios -- 5.2.2. Isolated AeroMACS scenario: 
       preliminary results -- 5.2.2.1. Individual risks -- 
       5.2.2.2. Propagated risks -- 5.2.2.3. Node and network 
       risks -- 5.2.3. Isolated AeroMACS scenario: EAP vs. RSA 
       sub-scenario -- 5.2.4. Preliminary AeroMACS security 
       enhancement guidance -- 5.2.5. AeroMACS implementation 
       improvements: isolated scenario without operational server
       vulnerabilities -- 5.2.5.1. Experimental inputs -- 
       5.2.5.2. Network topology -- 5.2.5.3. Vulnerability 
       statistics -- 5.2.5.4. Individual risk results -- 5.2.5.5.
       Propagated risk results -- 5.2.5.6. Network risk results -
       - 5.2.6. AeroMACS topological improvements: isolated 
       scenario with two ASN gateways -- 5.2.6.1. Experimental 
       inputs -- 5.2.6.2. Network topology -- 5.2.6.3. 
       Vulnerability statistics -- 5.2.6.4. Individual risk 
       results -- 5.2.6.5. Propagation risk results -- 5.2.6.6. 
       Network risk results -- 5.2.7. Scenario with end-to-end 
       AeroMACS topology -- 5.2.7.1. Experimental inputs -- 
       5.2.7.2. Network topology -- 5.2.7.3. Vulnerability 
       statistics -- 5.2.7.4. Individual risk results -- 5.2.7.5.
       Propagated risk results -- 5.2.7.6. Network risk results -
       - 5.3. Improving AeroMACS network security -- 5.3.1. DHCP 
       security -- 5.3.2. Mobile IP security -- CONCLUSION -- 
       BIBLIOGRAPHY -- INDEX 
520    The focus of this book is risk assessment methodologies 
       for network architecture design. The main goal is to 
       present and illustrate an innovative risk propagation-
       based quantitative assessment tool. This original approach
       aims to help network designers and security administrators
       to design and build more robust and secure network 
       topologies. As an implementation case study, the authors 
       consider an aeronautical network based on AeroMACS 
       (Aeronautical Mobile Airport Communications System) 
       technology. AeroMACS has been identified as the wireless 
       access network for airport surface communications that 
       will soon be deployed in European and American airports 
       mainly for communications between aircraft and airlines. 
       It is based on the IEEE 802.16-2009 standard, also known 
       as WiMAX. The book begins with an introduction to the 
       information system security risk management process, 
       before moving on to present the different risk management 
       methodologies that can be currently used (quantitative and
       qualitative). In the third part of the book, the authors' 
       original quantitative network risk assessment model based 
       on risk propagation is introduced. Finally, a network case
       study of the future airport AeroMACS system is presented. 
       This example illustrates how the authors' quantitative 
       risk assessment proposal can provide help to network 
       security designers for the decision-making process and how
       the security of the entire network may thus be improved. 
       Contents Part 1. Network Security Risk Assessment 1. 
       Introduction to Information System Security Risk 
       Management Process. 2. System Security Risk Management 
       Background. 3. A Quantitative Network Risk Management 
       Methodology Based on Risk Propagation. Part 2. Application
       to Airport Communication Network Design 4. The AeroMACS 
       Communication System in the SESAR Project. 5. Aeronautical
       Network Case Study. About the Authors 
520 8  Mohamed Slim Ben Mahmoud is a research engineer for the 
       research group ResCo at the TELECOM laboratory of ENAC, 
       the French national institution for civil aviation. 
       Nicolas Larrieu is a teacher and researcher at the 
       research group ResCo at the TELECOM laboratory of ENAC. 
       Alain Pirovano is a teacher and researcher and head of the
       research group ResCo at the TELECOM laboratory of ENAC 
588    Description based on publisher supplied metadata and other
       sources 
590    Electronic reproduction. Ann Arbor, Michigan : ProQuest 
       Ebook Central, 2020. Available via World Wide Web. Access 
       may be limited to ProQuest Ebook Central affiliated 
       libraries 
650  0 Computer networks -- Security measures -- 
       Design.;Aeronautics -- Communication systems -- Design and
       construction 
655  4 Electronic books 
700 1  Ben Mahmoud, Mohamed Slim 
700 1  Pirovano, Alain 
700 1  Ben Mahmoud, Mohamed Slim 
700 1  Mahmoud, M Ben 
700 1  Larrieu, M 
700 1  Pirovano, M 
700 1  Ben Mahmoud, Mohamed Slim 
700 1  Larrieu, Nicolas 
700 1  Pirovano, Aliain 
776 08 |iPrint version:|aLarrieu, Nicolas|tRisk Propagation 
       Assessment for Network Security : Application to Airport 
       Communication Network Design|dHoboken : John Wiley & Sons,
       Incorporated,c2013|z9781118579947 
830  0 FOCUS 
856 40 |uhttps://ebookcentral.proquest.com/lib/sinciatw/
       detail.action?docID=1168523|zClick to View