Method for assessing efficiency of the information security management system

被引:2
|
作者
Kiedrowicz, Maciej [1 ]
Stanik, Jerzy [1 ]
机构
[1] Mil Univ Technol, Fac Cybernet, Urbanowicza Str 2, Warsaw, Poland
关键词
security; security system; security configuration; configuration of security measures; loss of efficiency of the security system;
D O I
10.1051/matecconf/201821004011
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The article addresses the issue of efficiency assessment of the security system (SS) in terms of the Information Security Management System (information resources of the information system in an organization). It is assumed that the purpose of such security system is to achieve a declared level of protection of the information system resources. Therefore, the level of security of information system in a given organization shall be determined by the efficiency assessment of the security system. The efficiency of the security system mainly depends on the functional properties of its components and other factors occurring in its environment. The article mainly focuses on security configuration, i.e. technical configuration and security organization configuration. The thesis was adopted that the efficiency of the security system may be considered as a set-theoretic efficiency sum of the security configurations invoked in such system. Additionally, it was assumed that a prerequisite for the desired measures (indicators) of the efficiency assessment of the SS shall be to propose such measures and develop appropriate ways (methods) of their calculation. The efficiency measure for the SS as well as two methods of efficiency assessment of the SS were proposed in the article.
引用
收藏
页数:7
相关论文
共 50 条
  • [1] Expert System for Assessing the Efficiency of Information Security
    Erulanova, Aizhan
    Soltan, Gulzhan
    Baidildina, Aizhan
    Amangeldina, Marzhan
    Aset, Askhat
    [J]. 2020 7TH INTERNATIONAL CONFERENCE ON ELECTRICAL AND ELECTRONICS ENGINEERING (ICEEE 2020), 2020, : 355 - 359
  • [2] Information Security Culture: Towards an Instrument for Assessing Security Management Practices
    Lim, Loo S.
    Maynard, Sean B.
    Ahmad, Atif
    Chang, Shanton
    [J]. INTERNATIONAL JOURNAL OF CYBER WARFARE AND TERRORISM, 2015, 5 (02) : 31 - 52
  • [3] A New Method for the Identification of Proactive Information Security Management System Metrics
    Hajdarevic, Kemal
    Allen, Pat
    [J]. 2013 36TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2013, : 1121 - 1126
  • [4] Information Security Management Method for Households
    Murane, Ilze
    [J]. DATABASES AND INFORMATION SYSTEMS VI: SELECTED PAPERS FROM THE NINTH INTERNATIONAL BALTIC CONFERENCE (DB&IS 2010), 2011, 224 : 353 - 366
  • [5] Security for System Wide Information Management Collaborative Information Management
    Wilson, Ian
    Yang, Sherry
    [J]. 2017 INTEGRATED COMMUNICATIONS, NAVIGATION AND SURVEILLANCE CONFERENCE (ICNS), 2017,
  • [6] Conceptual Model of the Efficiency of Information Security System
    Salov, Igor, V
    Shagapov, Ildar A.
    Ismagilova, Albina S.
    [J]. IMITATION MARKET MODELING IN DIGITAL ECONOMY: GAME THEORETIC APPROACHES, 2022, 368 : 221 - 227
  • [7] EXPERIENCE WITH INFORMATION SECURITY MANAGEMENT SYSTEM
    Drastich, Artin
    [J]. KNOWLEDGE FOR MARKET USE 2017: PEOPLE IN ECONOMICS - DECISIONS, BEHAVIOR AND NORMATIVE MODELS, 2017, : 1133 - 1139
  • [8] Information security management system standards
    Edward Humphreys
    [J]. Datenschutz und Datensicherheit - DuD, 2011, 35 (1) : 7 - 11
  • [9] Familiarity with information security management system
    Nakhaie, Hamid
    Zadeh, Asma Esmail
    [J]. EDUCATION AND MANAGEMENT TECHNOLOGY, ICEMT 2011, 2011, 13 : 349 - 351
  • [10] IMPLEMENTATION OF INFORMATION SECURITY MANAGEMENT SYSTEM
    Drastich, Martin
    [J]. PROCEEDINGS OF THE 10TH INTERNATIONAL SCIENTIFIC CONFERENCE: ECONOMIC POLICY IN THE EUROPEAN UNION MEMBER COUNTRIES: SELECTED PAPERS, 2013, : 49 - 55