Show simple item record

dc.contributor.advisorOtero, Carlos E.
dc.contributor.authorRidley, Matthew
dc.date.accessioned2019-04-30T16:43:07Z
dc.date.available2019-04-30T16:43:07Z
dc.date.created2018-12
dc.date.issued2018-12
dc.date.submittedDecember 2018
dc.identifier.urihttp://hdl.handle.net/11141/2786
dc.descriptionThesis (M.S.) - Florida Institute of Technology, 2018en_US
dc.description.abstractModern day applications can be spread across multiple virtual or physical systems, and be accessed or attacked by pretty much any one any where. Cybersecurity is used to mitigate these cyber threats but there are limited resources that can be dedicated to security. As result, trade-offs and decisions must be made around what is prioritized and what isn’t. Cyber risk management provides methodologies for identifying threats, evaluating risks and making decisions, however, it can be difficult to determine whether the system is actually secure enough and the risk is actually within an acceptable parameters. This thesis provides a framework for managing threats and quantifying the security posture, in the form of risk desirability, of cyber systems.en_US
dc.format.mimetypeapplication/pdf
dc.language.isoen_USen_US
dc.rightsCC BY 4.0en_US
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/legalcodeen_US
dc.titleA Framework for Characterizing the Security Posture of Cyber Systemsen_US
dc.typeThesisen_US
dc.date.updated2019-04-25T13:24:05Z
thesis.degree.nameMaster of Science in Computer Engineeringen_US
thesis.degree.levelMastersen_US
thesis.degree.disciplineComputer Engineeringen_US
thesis.degree.departmentComputer Engineering and Sciencesen_US
thesis.degree.grantorFlorida Institute of Technologyen_US
dc.type.materialtext


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record

CC BY 4.0
Except where otherwise noted, this item's license is described as CC BY 4.0