Network Security Threats Dependent Variables (multiplied by weight)

Security Tools & Procedures Independent Variables

Sniffing Attacks

DOS Attacks

MitM Attacks

Data Theft

Phishing Attacks

Trojans

Stolen Passwords

Hacking

Privacy Loss

Network Intrusions

Weight

3

5

5

5

6

7

7

12

12

16

Averages

3

6.25

6.25

6.25

7.2

8.17

9.8

14.4

18

32

Use NIDS

5

12

64

Use Firewalls

5

6

7

14

12

12

64

Use NIPS

16

Use 2F Authentication

5

5

5

6

14

12

12

Use Anti-DOS

Use Digital Certificates

6

7

7

24

12

16

Use Hashing Algorithm

3

5

5

12

Use Encryption

3

10

10

10

6

7

24

60

Use SIEM

12

Train Employees

6

7

14

12

32

Apply Patches

7

12

16

Use Whitelist

3

5

Stenography

12

Use Remote Access Server

16

Backup files

5

12

Use Permission Controls

12

Use Antivirus

6

7

7

12

12

32

Totals

9

25

25

25

36

49

49

144

144

256