Global network security: a vulnerability assessment of seven popular outsourcing countries

MIDDLETON, Ray, DAY, David and LALLIE, Harjinder Singh (2013). Global network security: a vulnerability assessment of seven popular outsourcing countries. In: 2012 IEEE International Conference on Green Computing and Communications. IEEE.

[img]
Preview
PDF
GLOBAL_VULNERABILITY_final_revision.pdf - Accepted Version
All rights reserved.

Download (798kB) | Preview
Official URL: https://ieeexplore.ieee.org/document/6468301
Link to published version:: https://doi.org/10.1109/GreenCom.2012.25
Related URLs:

    Abstract

    With increasingly more businesses engaging in offshore outsourcing, organisations need to be made aware of the global differences in network security, before entrusting a nation with sensitive information. In July 2011, Syn and Nackrst1 explored this topic by analysing seven countries from a wide spectrum across the globe for network security vulnerabilities. The countries selected were China, the United Kingdom, Germany, Russia, India, Mexico and Romania. Their method utilises Nmap and Nessus to probe and test for network vulnerabilities from each respective nation, in order to collect quantitative data for national vulnerability volumes. The Vulnerability statistics collected are of four categories; High,Medium, Low and Open Ports. This paper extends Syn and Nackrst1’s work by constructing a more detailed analysis of their results, showing the number of real-world vulnerabilities per nation; the differences between national levels of network security, the ratios of vulnerabilities/IP address; and vulnerability summary rankings. Multiple causal factors are also looked at to quantify the reasoning behind the varying levels of vulnerabilities per nation. This paper concludes that each nation has millions of vulnerabilities of varying amounts, and therefore, each nation differs in network security levels. Mexico and India exhibited the most worrying statistics, with the highest number of high level vulnerabilities/IP address ratio. Ultimately, this paper highlights the vulnerability levels that organisations are faced with when engaging in foreign and domestic outsourcing.

    Item Type: Book Section
    Additional Information: Conference organised in conjunction with IEEE GreenCom 2012 and ISSS CPSCom 2012

    Paper presented in iThings 4 :Security Session Chair: Julien Bourgeois, Femto-ST University of Franche-Comté, France.

    Research Institute, Centre or Group - Does NOT include content added after October 2018: Cultural Communication and Computing Research Institute > Communication and Computing Research Centre
    Departments - Does NOT include content added after October 2018: Faculty of Science, Technology and Arts > Department of Computing
    Identification Number: https://doi.org/10.1109/GreenCom.2012.25
    Depositing User: David Day
    Date Deposited: 27 Feb 2015 10:27
    Last Modified: 18 Mar 2021 05:22
    URI: http://shura.shu.ac.uk/id/eprint/5249

    Actions (login required)

    View Item View Item

    Downloads

    Downloads per month over past year

    View more statistics