Proposed Isomorphic Graph Model for Risk Assessment on a Unix Operating System
Prashant Kumar Patra and
Padma Lochan Pradhan
Additional contact information
Prashant Kumar Patra: Department of Computer Science & Engineering, College of Engineering & Technology, Bhubaneswar, Odisha, India
Padma Lochan Pradhan: Dept. of CSE, Sikha ‘O’ Anusandhan University, Bhubaneswar, Odhsha, India
International Journal of Risk and Contingency Management (IJRCM), 2013, vol. 2, issue 3, 49-62
Abstract:
Control and risk are the two parts of the coin. Risk assessment is the process of identifying uncertainties, vulnerabilities and threats to the operating system resources in order to achieve business objectives. Risk evaluation involved deciding what counter measures to take in reducing uncertainty to the lowest level of risk. Control is probably the most important aspect of communications security and becoming increasingly important as basic building block for system security. Advanced Encryption Standard (AES) is a primary method of protecting system resources. AES is inversely proportional to the Risk (C=K/R) & mean while control is directly proportional to the quality of standard. AES Control will be optimize the risk as well as improve the IS standard. Control is directly proportional to risk mitigation & mitigation is directly proportional to standard. This paper contributes to the development of an optimization method that aims to determine the optimal cost to be invested into security method, model & mechanisms deciding on the measure component of operating system resources (i.e. Processor, Memory & Encryption). Furthermore, the method & mechanism optimize the cost, time & resources is supposed to optimize the system risks. The proposed model would be update the value of Processor, Memory & Encryption key dynamically as per business requirement and availability of technology & resources. Proposed model is going to be optimizing risk and maximizing the performance. In this study the researchers develop an isomorphic graph model for optimizing risk in the Unix operating system.
Date: 2013
References: Add references at CitEc
Citations:
Downloads: (external link)
http://services.igi-global.com/resolvedoi/resolve. ... 018/ijrcm.2013070104 (application/pdf)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:igg:jrcm00:v:2:y:2013:i:3:p:49-62
Access Statistics for this article
International Journal of Risk and Contingency Management (IJRCM) is currently edited by Narasimha Rao Vajjhala
More articles in International Journal of Risk and Contingency Management (IJRCM) from IGI Global
Bibliographic data for series maintained by Journal Editor ().