CYBERSECURITY-RELATED STANDARDS ACTIVITY IN THE TELECOMMUNICATIONS INDUSTRY ASSOCIATION. Eric Barnhart, Division Chief Georgia Tech Research Institute. TIA Cybersecurity Background. TIA focus on Critical Infrastructure Protection and Homeland Security includes efforts in Network Security
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
CYBERSECURITY-RELATED STANDARDS ACTIVITY IN THE TELECOMMUNICATIONS INDUSTRY ASSOCIATION
Eric Barnhart, Division Chief
Georgia Tech Research Institute
In order to quantify vulnerability, we assign numeric values to multiple factors. Vulnerability is calculated as the product of likelihood and impact (after NIST, OWASP,SANS Institute, and other similar approaches for IT risk management).
Criteria assigning likelihood levels include assessing the attacker, motivation, opportunity, and capability:
Impact characterizes the implications/seriousness of a successful attack, with the following levels: