Talk With an Expert

Application of the Survivable Network Analysis Method to Secure My Office System

Application of the Survivable Network Analysis Method to Secure My Office System (PDF, 1.64MB)Published: 28 Dec, 2001
Created by:
Dale Wutz

This paper addresses the results of applying the Survivable Network Analysis method to my office system. A brief overview of the method will be presented followed by a detailed description of the method. The method consists of four basic steps which will be explained. I will show how to implement these steps and the results obtained in the application of this method to securing my system. The final results of the analysis will be presented which show that this method can produce a survivable Windows 98 machine, Sun machine and a disk array. I wanted to perform a risk assessment on my office environment. I also wanted to plan and implement new features to my existing configuration. The Survivable Network Analysis (SNA) method was chosen. This method was used because it is capable of doing both assessments. I also chose this method because security is an integral part of each step. It will become clear that this is a concept paper because I do not have the resources for a full analysis but the key concepts will be covered and the results used in the assessment. I will present a brief background of the method, an overview of the key concepts and the application to my system.

Application of the Survivable Network Analysis Method to Secure My Office System