MIDDLETON, Ray, DAY, David and LALLIE, Harjinder Singh (2013). Global network security: a vulnerability assessment of seven popular outsourcing countries. In: 2012 IEEE International Conference on Green Computing and Communications. IEEE.
![]()
|
PDF
GLOBAL_VULNERABILITY_final_revision.pdf - Accepted Version All rights reserved. Download (798kB) | Preview |
Abstract
With increasingly more businesses engaging in offshore outsourcing, organisations need to be made aware of the global differences in network security, before entrusting a nation with sensitive information. In July 2011, Syn and Nackrst1 explored this topic by analysing seven countries from a wide spectrum across the globe for network security vulnerabilities. The countries selected were China, the United Kingdom, Germany, Russia, India, Mexico and Romania. Their method utilises Nmap and Nessus to probe and test for network vulnerabilities from each respective nation, in order to collect quantitative data for national vulnerability volumes. The Vulnerability statistics collected are of four categories; High,Medium, Low and Open Ports. This paper extends Syn and Nackrst1’s work by constructing a more detailed analysis of their results, showing the number of real-world vulnerabilities per nation; the differences between national levels of network security, the ratios of vulnerabilities/IP address; and vulnerability summary rankings. Multiple causal factors are also looked at to quantify the reasoning behind the varying levels of vulnerabilities per nation. This paper concludes that each nation has millions of vulnerabilities of varying amounts, and therefore, each nation differs in network security levels. Mexico and India exhibited the most worrying statistics, with the highest number of high level vulnerabilities/IP address ratio. Ultimately, this paper highlights the vulnerability levels that organisations are faced with when engaging in foreign and domestic outsourcing.
Item Type: | Book Section |
---|---|
Additional Information: | Conference organised in conjunction with IEEE GreenCom 2012 and ISSS CPSCom 2012
Paper presented in iThings 4 :Security Session Chair: Julien Bourgeois, Femto-ST University of Franche-Comté, France. |
Research Institute, Centre or Group - Does NOT include content added after October 2018: | Cultural Communication and Computing Research Institute > Communication and Computing Research Centre |
Departments - Does NOT include content added after October 2018: | Faculty of Science, Technology and Arts > Department of Computing |
Identification Number: | https://doi.org/10.1109/GreenCom.2012.25 |
Depositing User: | David Day |
Date Deposited: | 27 Feb 2015 10:27 |
Last Modified: | 18 Mar 2021 05:22 |
URI: | https://shura.shu.ac.uk/id/eprint/5249 |
Actions (login required)
![]() |
View Item |
Downloads
Downloads per month over past year