Please use this identifier to cite or link to this item:

Title: A Risk Management Framework in the Cloud using Big Data and Security Informatics - An Application of Attack Tree for Analysis of Social Media Networks
Authors: Subasinghe, K.D.B.H
Kodithuwakku, S.R.
Perera, H.S.C.
Keywords: Social Networks
Risk Management
Attack Tree
Big Data
Security Informatics
Web Intelligence
Issue Date: 26-Sep-2014
Series/Report no.: PNCTM;01
Abstract: Social media networks have opened up a new avenue of communication for billions of people around the world. In fact, the major attraction of using this technology is the ease with which people can share their personal information with their friends. Cloud computing is the use of information communication technology resources that are delivered as a service over a network. Therefore, the advancement in ICT as a globe has resulted in an enormous volume of security related information present on the web largely when it comes to social media networks. Nevertheless, exploring, discovering and analyzing these data is a very challenging task. As a result, the social media users believe that convenience comes first without paying attention to the hazardous consequences that arise as a result of critical information being published on the World Wide Web. Therefore, the lack of privacy awareness in Social Media networks is an issue that needs to be addressed. Consequently, upon carrying out a detailed background review it was revealed that it is an urgent requirement that the enormous volume of security relevant information is managed and that a risk management framework is set up in the Social networks. Therefore, the objective of this project is to carry out a research on “Social Data analytics and Management of Social Media Networks through Web Intelligence and Security Informatics by the development of a Risk Management Framework”. This involves exploration and analysis of the social media network data using a systematic approach namely, attack trees. The proposed framework would help to streamline the information sources related and help in the decision making process. Therefore, with the changing face of cyber security, although it is difficult, detecting the potential cyber-attacks or crimes is possible and feasible with the vast improvements in information communication technology.
Description: SLIIT Research
ISSN: 1800-3591
Appears in Collections:NCTM - SLIIT 2014 -JANUARY

Files in This Item:

File Description SizeFormat
1 -6 A Risk Management Framework -formatted-final.pdf339.14 kBAdobe PDFView/Open
View Statistics

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.


Valid XHTML 1.0! DSpace Software Copyright © 2002-2010  Duraspace - Feedback