Security Metrics: Principles and Security Assessment Methods

被引:0
|
作者
Arabsorkhi, Abouzar [1 ]
Ghaffari, Fariba [2 ]
机构
[1] Iran Telecom Res Ctr, Tehran, Iran
[2] Tarbiat Modares Univ, Tehran, Iran
关键词
Security Assessment; Taxonomy of Security Metric; Security Metric; Meta-Metric;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Nowadays, Information Technology is one of the important parts of human life and also of organizations. Organizations face problems such as IT problems. To solve these problems, they have to improve their security sections. Thus there is a need for security assessments within organizations to ensure security conditions. The use of security standards and general metric can be useful for measuring the safety of an organization; however, it should be noted that the general metric which are applied to businesses in general cannot be effective in this particular situation. Thus it's important to select metric standards for different businesses to improve both cost and organizational security. The selection of suitable security measures lies in the use of an efficient way to identify them. Due to the numerous complexities of these metric and the extent to which they are defined, in this paper that is based on comparative study and the benchmarking method, taxonomy for security measures is considered to be helpful for a business to choose metric tailored to their needs and conditions.
引用
收藏
页码:305 / 310
页数:6
相关论文
共 50 条
  • [1] Novel security models, metrics and security assessment networks
    Enoch, Simon Yusuf
    Lee, Jang Se
    Kim, Dong Seong
    [J]. COMPUTER NETWORKS, 2021, 189
  • [2] Ontology of Metrics for Cyber Security Assessment
    Doynikova, Elena
    Fedorchenko, Andrey
    Kotenko, Igor
    [J]. 14TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2019), 2019,
  • [3] A Primer on Hardware Security: Models, Methods, and Metrics
    Rostami, Masoud
    Koushanfar, Farinaz
    Karri, Ramesh
    [J]. PROCEEDINGS OF THE IEEE, 2014, 102 (08) : 1283 - 1295
  • [4] METHODS OF SECURITY CULTURE ASSESSMENT
    Halaj, M.
    Hofreiter, L.
    [J]. EDULEARN18: 10TH INTERNATIONAL CONFERENCE ON EDUCATION AND NEW LEARNING TECHNOLOGIES, 2018, : 3958 - 3966
  • [5] TRANSIENT SECURITY ASSESSMENT METHODS
    RUDNICK, H
    BRAMELLER, A
    [J]. PROCEEDINGS OF THE INSTITUTION OF ELECTRICAL ENGINEERS-LONDON, 1978, 125 (02): : 135 - 140
  • [6] Security Metrics Foundations for Computer Security
    Trcek, Denis
    [J]. COMPUTER JOURNAL, 2010, 53 (07): : 1106 - 1112
  • [7] Security Metrics and Security Investment Models
    Boehme, Rainer
    [J]. ADVANCES IN INFORMATION AND COMPUTER SECURITY, 2010, 6434 : 10 - 24
  • [8] Application of Multicriteria Methods for Improvement of Information Security Metrics
    Abdiraman, Aliya
    Goranin, Nikolaj
    Balevicius, Simas
    Nurusheva, Assel
    Tumasoniene, Inga
    [J]. SUSTAINABILITY, 2023, 15 (10)
  • [9] Information Visualization Metrics and Methods for Cyber Security Evaluation
    Langton, John T.
    Baker, Alex
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS: BIG DATA, EMERGENT THREATS, AND DECISION-MAKING IN SECURITY INFORMATICS, 2013, : 292 - 294
  • [10] Automatic Security Analysis Using Security Metrics
    Sun, Kun
    Jajodia, Sushil
    Li, Jason
    Cheng, Yi
    Tang, Wei
    Singhal, Anoop
    [J]. 2011 - MILCOM 2011 MILITARY COMMUNICATIONS CONFERENCE, 2011, : 1207 - 1212