A Methodology for ICT Security Vulnerabilities Assessment

Publish Year: 1396
نوع سند: مقاله کنفرانسی
زبان: English
View: 436

This Paper With 18 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

ICMEAC05_053

تاریخ نمایه سازی: 1 مرداد 1397

Abstract:

The pervasive and complex nature of security threats to Information and CommunicationTechnology (ICT) continues to be a major concern for modern organizations, academic centers,military, government, and businesses. ICT infrastructures ,which have become the cornerstoneof organizational management, are highly vulnerable to potential attacks and sabotage. ICTvulnerabilities may be attributable to internal and external sources. On the other hand, globalcommunication media of ICT that is internet has a structure that allowed for many securitythreats to occur. But the architecture of the internet, when modified can reduce the possibleattacks that can be sent across the ICT. For this reason, Knowing the ICT security issues andchallenges, allows the necessary security remedy to be adopted. So, in this paper, we present amethodology to consider ICT vulnerabilities in order to understand current ICT security issues,attack methods through the internet, and security measures that are necessary to preventsecurity problems caused by these vulnerabilities.

Authors

Mahmoud Hamidian

Iran Telecommunication Research Center(ITRC)