Author

Sher Lurain

Abstract

This paper investigates fundamental security issues and the growing impact of security breaches on computer networks. Cost-effective security measures, such as asset-threat analysis, enable monitoring of security levels in complex systems. An evaluation of one technique, called the Livermore Risk Analysis Methodology (LRAM) is documentedC 1 ] . Untrusted communication lines, unauthorized access and unauthorized dissemination of information must be contained. The complexity and corresponding sophistication of todays' systems and the reliance of management on information generated by these systems make them attractive targets for computer related crimes. A profile of computer criminals and their crimes emphasize the importance of management involvement and social ethics as determents to crime. An overview of system security, control concepts, communication and transmission security, and a discussion of threats, vulnerabilities, and countermeasures is provided. The growing need for risk management models is presented as well as an overview of LRAM. Risk assessment of a specific system case study and risk profiles are developed using LRAM.

Library of Congress Subject Headings

Computers--Access control--Evaluation; Computer networks--Security measures--Evaluation

Publication Date

1990

Document Type

Thesis

Department, Program, or Center

Computer Science (GCCIS)

Advisor

Holiotis, James

Advisor/Committee Member

Hall, Will

Advisor/Committee Member

Johnson, Daryl

Comments

Note: imported from RIT’s Digital Media Library running on DSpace to RIT Scholar Works. Physical copy available through RIT's The Wallace Library at: QA76.9.A25 L873 1990

Campus

RIT – Main Campus

Share

COinS