A risk analysis and risk management methodology for mitigating wireless local area networks (WLANs) intrusion security risks

Show simple item record

dc.contributor.advisor Eloff, Jan H.P. en
dc.contributor.postgraduate Abdullah, Hanifa en
dc.date.accessioned 2013-09-07T13:59:38Z
dc.date.available 2006-10-12 en
dc.date.available 2013-09-07T13:59:38Z
dc.date.created 2006-09-05 en
dc.date.issued 2006-10-12 en
dc.date.submitted 2006-10-12 en
dc.description Dissertation (MSc (Computer Science))--University of Pretoria, 2006. en
dc.description.abstract Every environment is susceptible to risks and Wireless Local Area Networks (WLANs) based on the Institute of Electrical and Electronics Engineers (IEEE) 802.11 standard are no exception. The most apparent risk of WLANs is the ease with which itinerant intruders obtain illicit entry into these networks. These intrusion security risks must therefore be addressed which means that information security risk analysis and risk management need to be considered as integral elements of the organisation’s business plan. A well-established qualitative risk analysis and risk management methodology, the Operationally Critical Threat Asset and Vulnerability Evaluation (OCTAVE) is selected for conducting the WLAN intrusion security risk analysis and risk management process. However, the OCTAVE risk analysis methodology is beset with a number of problems that could hamper a successful WLAN intrusion security risk analysis. The ultimate deliverable of this qualitative risk analysis methodology is the creation of an organisation-wide protection strategy and risk mitigation plan. Achieving this end using the OCTAVE risk analysis methodology requires an inordinate amount of time, ranging from months to years. Since WLANs are persistently under attack, there is a dire need for an expeditious risk analysis methodology. Furthermore, the OCTAVE risk analysis methodology stipulates the identification of assets and corresponding threat scenarios via a brainstorming session, which may be beyond the scope of a person who is not proficient in information security issues. This research was therefore inspired by the pivotal need for a risk analysis and risk management methodology to address WLAN intrusion attacks and the resulting risks they pose to the confidentiality, integrity and availability of information processed by these networks. Copyright en
dc.description.availability unrestricted en
dc.description.department Computer Science en
dc.identifier.citation Abdullah, H, 2006, A risk analysis and risk management methodology for mitigating wireless local area networks (WLANs) intrusion security risks , MSc(Computer Science) dissertation, University of Pretoria, Pretoria, viewed yymmdd < http://hdl.handle.net/2263/28649 > en
dc.identifier.other E6/2006/gm en
dc.identifier.upetdurl http://upetd.up.ac.za/thesis/available/etd-10122006-155850/ en
dc.identifier.uri http://hdl.handle.net/2263/28649
dc.language.iso en
dc.publisher University of Pretoria en_ZA
dc.rights © 2006, University of Pretoria. All rights reserved. The copyright in this work vests in the University of Pretoria. No part of this work may be reproduced or transmitted in any form or by any means, without the prior written permission of the University of Pretoria en
dc.subject Ooda cycle en
dc.subject Risk en
dc.subject Risk analysis en
dc.subject Risk management en
dc.subject Octave en
dc.subject Risk assessment en
dc.subject Wireless intrusion detection system en
dc.subject Wireless local area network (WLAN) en
dc.subject UCTD en_US
dc.title A risk analysis and risk management methodology for mitigating wireless local area networks (WLANs) intrusion security risks en
dc.type Dissertation en


Files in this item

This item appears in the following Collection(s)

Show simple item record