Show simple item record

dc.contributor.authorLitchfield, Aen_NZ
dc.contributor.authorShahzad, Aen_NZ
dc.contributor.editorSchwarz, Aen_NZ
dc.contributor.editorStafford, Ten_NZ
dc.contributor.editorHirschheim, Ren_NZ
dc.date.accessioned2019-02-18T21:17:16Z
dc.date.available2019-02-18T21:17:16Z
dc.date.copyright2018-08-16en_NZ
dc.identifier.citationTwenty-fourth Americas Conference on Information Systems,Information Systems Security and Privacy, New Orleans, Louisiana, August 16-18, 2018.
dc.identifier.urihttp://hdl.handle.net/10292/12262
dc.description.abstractA vulnerability prediction and risk assessment process for the Xen hypervisor that predicts the number of vulnerabilities and levels of risk a specific software version provides is presented. The hypervisor is a key component of virtualisation and is thus a target of attackers. When such critical infrastructure is compromised, then the assets of service consumers are consequently at risk. The benefit of a risk analysis process is that it provides surety for Cloud services consumers (making the Cloud Computing option more attractive) and assists Systems Administrators in decision making about software choices and version upgrades. The process has been tested on three popular open source, infrastructure level software packages. In each case, the level of predictive accuracy is excellent to good. The study combines quantitative and qualitative methods to predict vulnerabilities and determine risk levels.
dc.publisherAIS
dc.relation.urihttps://aisel.aisnet.org/amcis2018/Security/Presentations/9/
dc.rightsCopyright © 2018 Association for Information Systems (AIS) http://aisel.aisnet.org. All rights reserved. NOTICE: this is the author’s version of a work that was accepted for publication. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. Changes may have been made to this work since it was submitted for publication. A definitive version was subsequently published in (see Citation). The original publication is available at (see Publisher's Version).
dc.subjectVulnerability and risk assessment; XEN hypervisor; Threat actors; User classification; Threat level identification
dc.titleVulnerability and Risk Assessment of XEN Hypervisoren_NZ
dc.typeConference Contribution
dc.rights.accessrightsOpenAccessen_NZ
pubs.elements-id338012
aut.relation.conferenceAmericas Conference on Information Systemsen_NZ


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record