Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Jonathan Griffin is active.

Publication


Featured researches published by Jonathan Griffin.


Computer Networks and Isdn Systems | 1997

Applying military grade security to the Internet

Chris I. Dalton; Jonathan Griffin

Abstract The explosive growth witnessed in the Internet over the last few years has encouraged companies to connect to it and to offer services to their customers over it. Concerns about security are holding them back from all but the most restrictive connectivity. This paper explores the use of a military development, the Compartmented Mode Workstation in a commercial setting, as a platform that is secure enough to implement services that are accessed over the Internet. Two applications have been investigated in detail, a firewalled Domain Name System and a World Wide Web service with enhanced authentication. Finally, there is discussion of how other Internet-based services might benefit from the application of CMW technology.


annual computer security applications conference | 2008

Analysing the Performance of Security Solutions to Reduce Vulnerability Exposure Window

Yolanta Beres; Jonathan Griffin; Simon C. K. Shiu; Max Heitman; David Markle; Peter Ventura

In this paper we present a novel approach of using mathematical models and stochastic simulations to guide and inform security investment and policy change decisions. In particular, we investigate vulnerability management policies, and explore how effective standard patch management and emergency escalation based policies are, and how they can be combined with earlier, pre-patch mitigation measures to reduce the potential exposure window. The paper describes the model we constructed to represent typical vulnerability management processes in large organizations, which captures the external threat environment and the internal security processes and decision points. We also present the results from the experimental simulations, and show how changes in security solutions and policies, such as speeding up patch deployment and investing in early mitigation measures, affect the overall exposure window in terms of the time it takes to reduce the potential risk. We believe that this type of mathematical modelling and simulation-based approach provides a novel and useful way of considering security investment decisions, which is quite distinct from traditional risk analysis.


information security conference | 2012

Optimizing Network Patching Policy Decisions

Yolanta Beres; Jonathan Griffin

Patch management of networks is essential to mitigate the risks from the exploitation of vulnerabilities through malware and other attacks, but by setting too rigorous a patching policy for network devices the IT security team can also create burdens for IT operations or disruptions to the business. Different patch deployment timelines could be adopted with the aim of reducing this operational cost, but care must be taken not to substantially increase the risk of emergency disruption from potential exploits and attacks. In this paper we explore how the IT security policy choices regarding patching timelines can be made in terms of economically-based decisions, in which the aim is to minimize the expected overall costs to the organization from patching-related activity. We introduce a simple cost function that takes into account costs incurred from disruption caused by planned patching and from expected disruption caused by emergency patching. To explore the outcomes under different patching policies we apply a systems modelling approach and Monte Carlo style simulations. The results from the simulations show disruptions caused for a range of patch deployment timelines. These results together with the cost function are then used to identify the optimal patching timelines under different threat environment conditions and taking into account the organization’s risk tolerance.


Archive | 2002

Multiple trusted computing environments

Jonathan Griffin; Christopher I. Dalton; Michael Child; Liqun Chen; Andrew Patrick Norman


Archive | 2003

Signal level propagation mechanism for distribution of a payload to vulnerable systems

John Melvin Brawn; Andrew Patrick Norman; Chris Ralph Dalton; Jonathan Griffin


Archive | 2002

Multiple trusted computing environments with verifiable environment identities

Jonathan Griffin; Liqun Chen


Archive | 2003

Propagation of viruses through an information technology network

Jonathan Griffin; Andrew Patrick Norman; Matthew Murray Williamson; Aled Edwards


Archive | 2001

Computer system operable to revert to a trusted state

Jonathan Griffin


Archive | 2002

Method of identifying software vulnerabilities on a computer system

Andrew Patrick Norman; John Melvin Brawn; John P Scrimsher; Jonathan Griffin


Archive | 2002

Performing secure and insecure computing operations in a compartmented operating system

Jonathan Griffin; Christopher I. Dalton

Collaboration


Dive into the Jonathan Griffin's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge