loading
Papers

Research.Publish.Connect.

Paper

Authors: Michael Meinig and Christoph Meinel

Affiliation: University of Potsdam, Germany

ISBN: 978-989-758-282-0

Keyword(s): Risk Management, Security Awareness, Threat Awareness, Threat Modelling, Vulnerability Analysis.

Abstract: After land, sea, air and space, cyberspace has become the fifth domain of warfare. Organizations recognize the need for protecting confidential, secret - classified – information. Competitors and adversaries turn to illegal methods to obtain classified information. They try to gain a competitive advantage or close a technological gap as well as reduce dependencies on others. Classified information involves facts, subject matters or knowledge needing to be kept secret, regardless of the way in which the information is depicted. In networks with different security classifications a direct physical connection is not allowed. Consequently the possibility of coupling different security domains in affected organizations must be checked comprehensively under security aspects. In this paper we present a new security approach that helps to identify threats at transitions and security zones on valid data flow paths. It can be used to display security challenges within organizations using classi fied information such as governmental or military organizations. The methodology also incorporates new attributes for data flows in connected systems or processes. (More)

PDF ImageFull Text

Download
CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 34.236.216.93

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Meinig, M. and Meinel, C. (2018). Securing the Flow - Data Flow Analysis with Operational Node Structures.In Proceedings of the 4th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP, ISBN 978-989-758-282-0, pages 241-250. DOI: 10.5220/0006570302410250

@conference{icissp18,
author={Michael Meinig. and Christoph Meinel.},
title={Securing the Flow - Data Flow Analysis with Operational Node Structures},
booktitle={Proceedings of the 4th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,},
year={2018},
pages={241-250},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0006570302410250},
isbn={978-989-758-282-0},
}

TY - CONF

JO - Proceedings of the 4th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,
TI - Securing the Flow - Data Flow Analysis with Operational Node Structures
SN - 978-989-758-282-0
AU - Meinig, M.
AU - Meinel, C.
PY - 2018
SP - 241
EP - 250
DO - 10.5220/0006570302410250

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.