MIDDLETON, Ray, DAY, David and LALLIE, Harjinder Singh (2012). Global network security: a vulnerability assessment of seven popular outsourcing countries. In: The IEEE International Conference on Internet of Things (IEEE iThings 2012), Besançon, France, November 20-23, 2012. (Unpublished)
PDF (Global Network Security: A Vulnerability Assessment of Seven Popular Outsourcing Countries)
GLOBAL_VULNERABILITY_final_revision.pdf - Submitted Version
Restricted to Repository staff only
Available under License All rights reserved.
Download (798kB) | Contact the author
With increasingly more businesses engaging in offshore outsourcing, organisations need to be made aware of the global differences in network security, before entrusting a nation with sensitive information. In July 2011, Syn and Nackrst1 explored this topic by analysing seven countries from a wide spectrum across the globe for network security vulnerabilities. The countries selected were China, the United Kingdom, Germany, Russia, India, Mexico and Romania. Their method utilises Nmap and Nessus to probe and test for network vulnerabilities from each respective nation, in order to collect quantitative data for national vulnerability volumes. The Vulnerability statistics collected are of four categories; High,Medium, Low and Open Ports. This paper extends Syn and Nackrst1’s work by constructing a more detailed analysis of their results, showing the number of real-world vulnerabilities per nation; the differences between national levels of network security, the ratios of vulnerabilities/IP address; and vulnerability summary rankings. Multiple causal factors are also looked at to quantify the reasoning behind the varying levels of vulnerabilities per nation. This paper concludes that each nation has millions of vulnerabilities of varying amounts, and therefore, each nation differs in network security levels. Mexico and India exhibited the most worrying statistics, with the highest number of high level vulnerabilities/IP address ratio.
Ultimately, this paper highlights the vulnerability levels that organisations are faced with when engaging in foreign and domestic outsourcing.
|Item Type:||Conference or Workshop Item (Paper)|
Conference organised in conjunction with IEEE GreenCom 2012 and ISSS CPSCom 2012
Paper presented in iThings 4 :Security Session Chair: Julien Bourgeois, Femto-ST University of Franche-Comté, France.
|Research Institute, Centre or Group:||Cultural Communication and Computing Research Institute > Communication and Computing Research Centre|
|Depositing User:||David Day|
|Date Deposited:||27 Feb 2015 10:27|
|Last Modified:||19 Aug 2015 20:27|
Actions (login required)
Downloads per month over past year