Information Security of Highly Critical Wireless Networks by Maurizio Martellini Stanislav Abaimov Sandro Gaycken & Clay Wilson

Information Security of Highly Critical Wireless Networks by Maurizio Martellini Stanislav Abaimov Sandro Gaycken & Clay Wilson

Author:Maurizio Martellini, Stanislav Abaimov, Sandro Gaycken & Clay Wilson
Language: eng
Format: epub
Publisher: Springer International Publishing, Cham


13.3 Goals of Cyber Security Testing

According to a globally recognized model, developed by the National Institute of Standards and Technology [4], all information security measures try to address at least one of the three goals:Protect the confidentiality of data

Preserve the integrity of data

Promote the availability of data for authorized use.

Thus, the three security goals are “Confidentiality”, “Integrity”, and “Availability” (CIA), which form the CIA triad, the basis of all information security designs. The development of all information security policies and procedures is guided by these three goals.

To guarantee CIA of any computer system or network, cyber security testing detects and classifies flaws in cybersecurity. It identifies risks or the threats in the system and/or network; classifies potential vulnerabilities; and further helps in developing software, hardware, or physical solutions.

As the wireless systems have a more sophisticated design than the wired computer systems, their security testing is more complicated. In addition, it should acknowledge detectability and vulnerability of routers and adapters to further develop and deploy preventive measures against “eavesdropping”, denial of service, security breaches, and unauthorized remote control of wireless devices.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.