
Cracking and stiffness analysis of steel fiber reinforced concrete members
Darius Ulbinas
Summary of doctoral dissertation
Summaries of doctoral dissertations are not being sold
Justinas Janulevičius
Doctoral dissertation
Dissertations are not being sold
The growth of usage of Information Technology (IT) in daily operations of enterprises causes the value and the vulnerability of information to be at the peak of interest. Moreover, distributed computing revolutionized the outsourcing of computing functions, thus allowing flexible IT solutions. Since the concept of information goes beyond the traditional text documents, reaching manufacturing, machine control, and, to a certain extent – reasoning – it is a great responsibility to maintain appropriate information security.
Information Security (IS) risk analysis and maintenance require extensive knowledge about the possessed assets as well as the technologies behind them, to recognize the threats and vulnerabilities the infrastructure is facing. A way of formal description of the infrastructure – the Enterprise Architecture (EA) – offers a multiperspective view of the whole enterprise, linking together business processes as well as the infrastructure. Several IS risk analysis solutions based on the EA exist. However, lack of methods of IS risk analysis for virtualization technologies complicates the procedure, thus leading to reduced availability of such analysis.
The dissertation consists of an introduction, three main chapters and general conclusions. The first chapter introduces the problem of information security risk analysis and its’ automation. Moreover, state-of-the-art methodologies and their implementations for automated information security risk analysis are discussed.
The second chapter proposes a novel method for risk analysis of virtualization components based on the most recent data, including threat classification and specification, control means and metrics of the impact.
The third chapter presents an experimental evaluation of the proposed method, implementing it to the Cyber Security Modeling Language (CySeMoL) and comparing the analysis results to well-calibrated expert knowledge.
It was concluded that the automation of virtualization solution risk analysis provides sufficient data for adjustment and implementation of security controls to maintain optimum security level.
Read electronic version of the book:
Darius Ulbinas
Summary of doctoral dissertation
Summaries of doctoral dissertations are not being sold
Darius Mačiūnas
Doctoral dissertation
Dissertations are not being sold
Adas Meškėnas
Doctoral dissertation
Dissertations are not being sold
Tadas Lipinskis
Doctoral dissertation
Dissertations are not being sold
Tomas Grigalis
Doctoral dissertation
Dissertations are not being sold
Tomas Ratkevičius
Doctoral dissertation
Dissertations are not being sold
Giedrius Balčiūnas
Doctoral dissertation
Dissertations are not being sold
Marius Reizgevičius
Doctoral dissertation
Dissertations are not being sold
Rimantas Kupliauskas
Doctoral dissertation
Darius Jurkevičius
Summary of doctoral dissertation
Summaries of doctoral dissertations are not being sold
Jevgenija Rutė
Summary of doctoral dissertation
Summaries of doctoral dissertations are not being sold
Rasa Džiugaitė-Tumėnienė
Doctoral dissertation
Dissertations are not being sold
Kęstutis Normantas
Doctoral dissertation
Dissertations are not being sold
Ina Tetsman
Doctoral dissertation
Dissertations are not being sold
Aurimas Vilkelis
Summary of doctoral dissertation
Summaries of doctoral dissertations are not being sold
Virmantas Juocevičius
Summary of doctoral dissertation
Summaries of doctoral dissertations are not being sold
Justinas Janulevičius
Doctoral dissertation
Dissertations are not being sold