INFORMATION SYSTEMS SECURITY IN HIGH VULNERABILITY ENVIRONMENTS
Abstract
HIGH VULNERABILITY INFORMATION SYSTEMS ARE DEFINED THROUGH THE EXTREME VALUES OF THREE PARAMETERS: DATA, PROCEDURES (PRIMARILY ACCESS CONTROL PROCEDURES AND PROTECTION AGAINST VIRAL SETS PROCEDURES) AND THE DEGREE OF CONNECTIVITY AMONG THE DIFFERENT PARTS OF THE SYSTEM. IN THIS DISSERTATION, THE TERMS CONFIDENTIALITY, INTEGRITY AND AVAILABILITY ARE DEFINED FIRST, WITH THE USE OF Z NOTATION AND FUZZY SETS THEORY. IN THE SEQUENCE, A HOLISTIC APPROACH FOR THE DEVELOPMENT OF HEALTH CARE INFORMATION SYSTEMS IS PROPOSED, FOLLOWED BY A PROBABILISTIC-ZERO KNOWLEDGE PROTOCOL TO CONTROL THE ACCESS TO A SYSTEM, AS WELL AS TO A METHODOLOGY FOR INTRUSION PREVENTION AND DETECTION. FINALLY, A STRATEGY TO PROTECT A NETWORK OF COMPUTERS AGAINST VIRAL ATTACK IS INTRODUCED AND TESTED EXPERIMENTALLY, UTILIZING SIMULATION TECHNIQUES.
Download full text in PDF format (14.67 MB)
(Available only to registered users)
|
All items in National Archive of Phd theses are protected by copyright.
|
Usage statistics
VIEWS
Concern the unique Ph.D. Thesis' views for the period 07/2018 - 07/2023.
Source: Google Analytics.
Source: Google Analytics.
ONLINE READER
Concern the online reader's opening for the period 07/2018 - 07/2023.
Source: Google Analytics.
Source: Google Analytics.
DOWNLOADS
Concern all downloads of this Ph.D. Thesis' digital file.
Source: National Archive of Ph.D. Theses.
Source: National Archive of Ph.D. Theses.
USERS
Concern all registered users of National Archive of Ph.D. Theses who have interacted with this Ph.D. Thesis. Mostly, it concerns downloads.
Source: National Archive of Ph.D. Theses.
Source: National Archive of Ph.D. Theses.