Please use this identifier to cite or link to this item: http://hdl.handle.net/123456789/749
Title: Modeling Security as a Machine
Authors: Omar Ahmed Alsumait 
Supervisor: Dr. Sabah Al-Fedaghi
Keywords: Security : Machine
Issue Date: 2018
Publisher:  Kuwait university - college of graduate studies
Abstract: According to security experts, the new security era could be characterized as one of risk, complexity, and uncertainty in comparison with the relative certainty of the preceding four decades. Security is typically described as the protection of persons and critical infrastructures or organizations against such risks as terrorism and organized crime. From a tighter perspective, the dictionary provides a “simple” definition of security: “the area in a place where people are checked to make sure they are not carrying weapons or other illegal materials”. Current indicators note an increase in global security risk ratings. In the field of computer security, the protection of data, networks, and systems has become increasingly difficult to execute, due to the extensive increase in costs since, managing the technology and the environment has grown as a result of the highly dynamic and complex systems used. There is an immediate need to think differently, unconventionally, or from a new perspective regarding security tools and strategies. A facet in the study of security phenomena is the development of models that might be helpful in countering criminal activities that involve threat identification, risk analysis, and risk management. This thesis contributes toward developing a general model for security. It utilizes the new notion of security as a machine (a generalization of the well-known Input-Process-Output [IPO] model) and applies it to security. Security as a machine views a security environment in terms of the flows of things and uses this flow to establish a system-based representation. The machine is an abstract apparatus of five states (stages) arranged in order: creation, release, transfer, receipt, and process. Thus, this description divides a security area into stages
URI: http://hdl.handle.net/123456789/749
Appears in Programs:0612 Computer Engineering

Files in This Item:
File Description SizeFormat 
Thesis in word omar final v.pdf484,87 kBAdobe PDFView/Open    Request a copy
Show full item record

Page view(s)

26
Last Week
0
Last month
3
checked on Sep 25, 2020

Download(s)

6
checked on Sep 25, 2020

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.