Sign In
Not register? Register Now!
Pages:
5 pages/≈1375 words
Sources:
12 Sources
Style:
APA
Subject:
Management
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 26.1
Topic:

Uses of Mathematical Models in Cybersecurity and Information Security

Essay Instructions:

Instructions will be uploaded as an additional file as well as the resources.
Please include the introduction and the conclusion to avoid points deductions.

Essay Sample Content Preview:

Mathematical Model and Risk Management
Student’s Name
Institutional Affiliation
Mathematical Models and Risk Management
The advent of excessive usage of the internet and network technology in the past two decades has significantly improved the manner in which data and information are transferred and exchanged. Particularly, the ever-growing internet technology has offered numerous functionalities and facilities in the field of information technology. However, the advancement of the internet and network technologies have come with their fair share of challenges in terms of a suitable cyber defence system required to protect the valuable data and information stored on systems. The problem of cyber-attacks have become a menace today. Understanding the source and behaviours of the malicious attacks is necessary to overcome the problem. Therefore, mathematical modelling plays important roles in fixing the possible parameters of the malicious objects. Particularly, the function of mathematical models is to help in designing the cybersecurity systems as they reveal how systems threats propagates in the internet. Cyber threats emanate from various malicious objects such as worm, virus, Trojan horse, spam and certain harmful technologies like rootkits, bots, phishing and instant messaging. Moreover, models of information security typical refer to highly tractable and predictive mathematical models that provides abstract description of a system. Many of the existing models are designed to focus on flows of information in a system. Then, this paper discusses the application of mathematical models in cybersecurity and information security, and implementation of specific models in information security.
Uses of Mathematical Models in Cybersecurity.
The primary function of mathematical models is to provide theoretical description of a more complex reality. In others others words, the models simplifies the real artifacts to make them comprehensible and open analysis (Rasheed, 2014). A model provides protection to a system by keeping up confidential and prevent an unauthorized change to confidential data and information. Models are also used to determine the most appropriate conditions one can prove some types of systems are insecure (Rasheed, 2014). Also, other type of models are implemented to define how the computer system applies control.
Models can be designed as prediction models to predict impending attacks by using statistical techniques. The prediction model employs the concepts of probability and simulation. The model can be simulated to generate to predict it possible malicious objects and suggesting midcourse corrections. Through what-if analyses, the analysts can record the instances of threats and decode on the best option solution (Roy, Sarkar, Ganesan, & Goel, 2015). The model has been effective especially after the recent growing demand on market of both legal and illegal for information on computer system vulnerabilities. The continuous growth of market increases the probability of cyber-attacks targeting valuable information. Essentially, random scanning algorithm are developed to forecast the location of future crimes based on the activities of repeated offenders using the existing data in th...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

👀 Other Visitors are Viewing These APA Essay Samples:

HIRE A WRITER FROM $11.95 / PAGE
ORDER WITH 15% DISCOUNT!