|
|
| Network Security Threats Dependent Variables (multiplied by weight) |
| ||||||
Security Tools & Procedures Independent Variables | Sniffing Attacks | DOS Attacks | MitM Attacks | Data Theft | Phishing Attacks | Trojans | Stolen Passwords | Hacking | Privacy Loss | Network Intrusions |
Weight | 3 | 5 | 5 | 5 | 6 | 7 | 7 | 12 | 12 | 16 |
Averages | 3 | 6.25 | 6.25 | 6.25 | 7.2 | 8.17 | 9.8 | 14.4 | 18 | 32 |
Use NIDS |
| 5 |
|
|
|
|
| 12 |
| 64 |
Use Firewalls |
| 5 |
|
| 6 | 7 | 14 | 12 | 12 | 64 |
Use NIPS |
|
|
|
|
|
|
|
|
| 16 |
Use 2F Authentication |
| 5 | 5 | 5 | 6 | 14 |
| 12 | 12 |
|
Use Anti-DOS |
|
|
|
|
|
|
|
|
|
|
Use Digital Certificates |
|
|
|
| 6 | 7 | 7 | 24 | 12 | 16 |
Use Hashing Algorithm | 3 |
| 5 | 5 |
|
|
| 12 |
|
|
Use Encryption | 3 | 10 | 10 | 10 | 6 | 7 |
| 24 | 60 |
|
Use SIEM |
|
|
|
|
|
|
| 12 |
|
|
Train Employees |
|
|
|
| 6 | 7 | 14 |
| 12 | 32 |
Apply Patches |
|
|
|
|
|
| 7 | 12 |
| 16 |
Use Whitelist | 3 |
| 5 |
|
|
|
|
|
|
|
Stenography |
|
|
|
|
|
|
|
| 12 |
|
Use Remote Access Server |
|
|
|
|
|
|
|
|
| 16 |
Backup files |
|
|
| 5 |
|
|
| 12 |
|
|
Use Permission Controls |
|
|
|
|
|
|
|
| 12 |
|
Use Antivirus |
|
|
|
| 6 | 7 | 7 | 12 | 12 | 32 |
Totals | 9 | 25 | 25 | 25 | 36 | 49 | 49 | 144 | 144 | 256 |