14. Cyber Security Prediction Models

  1. Norman F. Schneidewind

Published Online: 3 AUG 2011

DOI: 10.1002/9781118098929.ch14

Systems and Software Engineering with Applications

Systems and Software Engineering with Applications

How to Cite

Schneidewind, N. F. (2011) Cyber Security Prediction Models, in Systems and Software Engineering with Applications, John Wiley & Sons, Inc., Hoboken, NJ, USA. doi: 10.1002/9781118098929.ch14

Publication History

  1. Published Online: 3 AUG 2011
  2. Published Print: 10 JAN 2011

ISBN Information

Print ISBN: 9780738158525

Online ISBN: 9781118098929

SEARCH

Keywords:

  • cyber security models;
  • data resources;
  • risk model;
  • exponential model;
  • intrusion model

Summary

This chapter contains sections titled:

  • Introduction

  • Cyber Security Strategies

  • Cyber Security Threat to the Internet

  • Internet Vulnerabilities

  • Cyber Security Threat to Critical Infrastructure

  • Cyber Security Issues

  • Cyber Security Theory

  • Importance of Cyber Security Models

  • Cyber Security Model Validation

  • Data Resources

  • Relationship of Availability and Security

  • Measurements in Cyber Security

  • Risk Model

  • Exponential Model #1

  • Exponential Model #2

  • Vulnerability Model

  • Development of Confidence Intervals for CERT Vulnerability Count

  • Intrusion Model

  • Relative Measures of Effectiveness

  • Time Duration of Intrusions Model