IEEE Member-only icon Abstraction and Modeling of Cyber Security tutorial, Part 2 Abstraction and Modeling of Cyber Security tutorial, Part 2

Abstraction and Modeling of Cyber Security tutorial, Part 2

2 views
  • Share
Create Account or Sign In to post comments
#Cyber Security

This is Part 2 of a 2-part tutorial that provides an approach to foundational modeling for a variety of cyber security threats and architectures, culminating in creating models for a new method of enterprise cyber security protection based on micro-segmented virtualization. Early disclosure models such as Bell-LaPadula and non-deducibility are reprised and shown to be valuable in establishing meaningful access policies for an organization. Corresponding underlying models of perimeter weaknesses are then shown to serve as the basis for supporting new designs that tailor micro-segments to more advanced, distributed, virtual enterprise security architectures. Taught by Edward Amoroso, former Chief Security Officer of AT&T Services.

This is Part 2 of a 2-part tutorial that provides an approach to foundational modeling for a variety of cyber security threats and architectures, culminating in creating models for a new method of enterprise cyber security protection based on micro-segmented virtualization. Early disclosure models such as Bell-LaPadula and non-deducibility are reprised and shown to be valuable in establishing meaningful access policies for an organization. Corresponding underlying models of perimeter weaknesses are then shown to serve as the basis for supporting new designs that tailor micro-segments to more advanced, distributed, virtual enterprise security architectures. Taught by Edward Amoroso, former Chief Security Officer of AT&T Services.

Advertisment

Advertisment