Enhanced risk assessment equation for IPV6 deployment

Deploying IPv6 concomitant with the emerging technologies exposes the enterprise networks to the unforeseen threats as well as the existing threats.In mitigating the threats, calculating the risks value for each of the identified threats is vital. However, the existing equation for risk assessment...

Full description

Saved in:
Bibliographic Details
Main Authors: Rosli, Athirah, Mat Taib, Abidah, Baharin, Hanif, Wan Ali, Wan Nor Ashiqin, Hamid, Ros Syamsul
Format: Conference or Workshop Item
Language:English
Published: 2015
Subjects:
Online Access:http://repo.uum.edu.my/15592/1/PID111.pdf
http://repo.uum.edu.my/15592/
http://www.icoci.cms.net.my/proceedings/2015/TOC.html
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.uum.repo.15592
record_format eprints
spelling my.uum.repo.155922016-04-27T08:33:36Z http://repo.uum.edu.my/15592/ Enhanced risk assessment equation for IPV6 deployment Rosli, Athirah Mat Taib, Abidah Baharin, Hanif Wan Ali, Wan Nor Ashiqin Hamid, Ros Syamsul QA75 Electronic computers. Computer science Deploying IPv6 concomitant with the emerging technologies exposes the enterprise networks to the unforeseen threats as well as the existing threats.In mitigating the threats, calculating the risks value for each of the identified threats is vital. However, the existing equation for risk assessment is inappropriate to be applied in assessing the risks in IPv6 because of their limitation in asset determination.Therefore, this paper highlights the modification made in the existing risk assessment equation.The enhanced risk assessment equation is used to calculate the risk value for IPv6 deployment.The enhanced equation adapts three elements: confidentiality, integrity and availability in achieving security goals. The importance of having the enhanced equation is it enables the network administrator to calculate the potential risks for each of the potential IPv6 attack.Securing the enterprise networks is an iterative process that has no ended points. Hence, it is crucial to modify and adapt a proper equation when performing the risk assessment.In the future, more experiments will be conducted to test for feasibility of the equation. 2015-08-11 Conference or Workshop Item PeerReviewed application/pdf en http://repo.uum.edu.my/15592/1/PID111.pdf Rosli, Athirah and Mat Taib, Abidah and Baharin, Hanif and Wan Ali, Wan Nor Ashiqin and Hamid, Ros Syamsul (2015) Enhanced risk assessment equation for IPV6 deployment. In: 5th International Conference on Computing and Informatics (ICOCI) 2015, 11-13 August 2015, Istanbul, Turkey. http://www.icoci.cms.net.my/proceedings/2015/TOC.html
institution Universiti Utara Malaysia
building UUM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Utara Malaysia
content_source UUM Institutionali Repository
url_provider http://repo.uum.edu.my/
language English
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Rosli, Athirah
Mat Taib, Abidah
Baharin, Hanif
Wan Ali, Wan Nor Ashiqin
Hamid, Ros Syamsul
Enhanced risk assessment equation for IPV6 deployment
description Deploying IPv6 concomitant with the emerging technologies exposes the enterprise networks to the unforeseen threats as well as the existing threats.In mitigating the threats, calculating the risks value for each of the identified threats is vital. However, the existing equation for risk assessment is inappropriate to be applied in assessing the risks in IPv6 because of their limitation in asset determination.Therefore, this paper highlights the modification made in the existing risk assessment equation.The enhanced risk assessment equation is used to calculate the risk value for IPv6 deployment.The enhanced equation adapts three elements: confidentiality, integrity and availability in achieving security goals. The importance of having the enhanced equation is it enables the network administrator to calculate the potential risks for each of the potential IPv6 attack.Securing the enterprise networks is an iterative process that has no ended points. Hence, it is crucial to modify and adapt a proper equation when performing the risk assessment.In the future, more experiments will be conducted to test for feasibility of the equation.
format Conference or Workshop Item
author Rosli, Athirah
Mat Taib, Abidah
Baharin, Hanif
Wan Ali, Wan Nor Ashiqin
Hamid, Ros Syamsul
author_facet Rosli, Athirah
Mat Taib, Abidah
Baharin, Hanif
Wan Ali, Wan Nor Ashiqin
Hamid, Ros Syamsul
author_sort Rosli, Athirah
title Enhanced risk assessment equation for IPV6 deployment
title_short Enhanced risk assessment equation for IPV6 deployment
title_full Enhanced risk assessment equation for IPV6 deployment
title_fullStr Enhanced risk assessment equation for IPV6 deployment
title_full_unstemmed Enhanced risk assessment equation for IPV6 deployment
title_sort enhanced risk assessment equation for ipv6 deployment
publishDate 2015
url http://repo.uum.edu.my/15592/1/PID111.pdf
http://repo.uum.edu.my/15592/
http://www.icoci.cms.net.my/proceedings/2015/TOC.html
_version_ 1644281757190586368
score 13.153044